EP0923258A2 - Integration scheme for a mobile telephone network with fixed terminals and a wireline network - Google Patents
Integration scheme for a mobile telephone network with fixed terminals and a wireline network Download PDFInfo
- Publication number
- EP0923258A2 EP0923258A2 EP98203361A EP98203361A EP0923258A2 EP 0923258 A2 EP0923258 A2 EP 0923258A2 EP 98203361 A EP98203361 A EP 98203361A EP 98203361 A EP98203361 A EP 98203361A EP 0923258 A2 EP0923258 A2 EP 0923258A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- subscriber
- network
- telecommunications network
- mobile telecommunications
- wireline
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/02—Inter-networking arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/20—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems
- H04M2207/206—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems composed of PSTN and wireless network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/14—WLL [Wireless Local Loop]; RLL [Radio Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/045—Interfaces between hierarchically different network devices between access point and backbone network device
Definitions
- the present invention may relate to the integration of two networks, e.g. a fixed and mobile telecommunications system and in particular to an access node and a responder for use in such an integrated system as well as methods of operating the integrated system, the responder and the access node. Further, the present invention may relate to a method and a system for providing fixed access terminals for a mobile telephone network. The present invention may also relate to a system and a method of providing fixed access to a mobile telecommunications network via an intermediate network such as a PSTN as well as to interfaces for routing communications through the intermediate network.
- an intermediate network such as a PSTN
- the present invention relates to the integration of fixed and mobile telecommunication services. Conventionally this integration is limited to the provision of single-number routing regardless of location, i.e. to provide mobility of the subscriber anywhere within a geographical area and independent of the transmission system of messages to the subscriber. Such schemes involve the co-operation of one or more of fixed, cellular radio or cordless telephone networks.
- POTS Packet Old Telephone System
- the service is generally tied to the access method. Service provisioning, customer service and problem resolution are tailored to the idea that access and service are tied together. The physical management of the large number of subscriber loops served by the network depends upon this mapping. Subscribers are provided with a directory number for a location in the system, i.e. to a connection point and not for a particular receiving device. Modifications to such conventional systems are known, e.g. fixed radio access known from the article by R. Dettmer, in the IEE Review from July, 1995, pages 145 to 148. Such radio access is merely the substitution of one leg of the transmission path of a single telecommunications network with a radio link but is not the integration of two networks.
- the more modern mobile telephone telecommunication systems allow call routing to a particular device independent of its location provided it is within the radio coverage area of the system.
- an electronic means for identifying the device and thereby indirectly the subscriber is provided in the receiving device.
- This identification may be in the form of information stored in a memory which is part of the mobile receiving device itself or it may be in a separate insertable memory module, for instance a Subscriber Identity Module (SIM) in an integrated chip card as is known from the European GSM mobile telecommunication system.
- SIM Subscriber Identity Module
- the radio telecommunication system protocols are used to identify a user from the SIM's encoded information, and the services to which the user has subscribed can be derived from the same stored information.
- FPLMTS Future Public Land Mobile Telecommunication System
- UMTS Universal Mobile Telecommunications System
- Certain types of data transmission may pose technical problems with mobile phones.
- Modern generated tones have gaps and strong phase changes due to rapid multipath fading. This results in data being garbled or lost.
- handoffs between cells of the mobile telecommunications system are an even stronger cause of data loss.
- This problem cannot be completely solved by using a stationary receiving device.
- handoffs can be expected within the normal duration of a fax message even if the faxing device is stationary.
- These handoffs are forced because of changes in the signal intensity caused by such variables as moving traffic, swinging cranes on building sites and the need to readjust the boundaries of cells in order to cope with load changes and the limitations of the frequency spectrum available.
- the bandwidth of a mobile telephone system is usually very limited whereas wireline connections may carry 100 kb/s or higher. Hence, for some types of traffic a mobile phone subscriber may prefer an alternative type of connection.
- a subscriber may wish to have all e-mail messages or faxes sent and received by a device which is not subjected to handovers and/or has a higher transmission rate. This could be achieved by automatically directing a call to a fixed telephone in a conventional (POTS) wireline telephone system.
- POTS conventional
- This approach has the disadvantage that the subscriber must subscribe to both the wireline and the wireless system.
- the subscriber may wish to make use of reductions in charges resulting from using one system for all services, rather than have to subscribe to two systems.
- One possible way of solving this problem would be for the radio telecommunications system provider to put in a wireline system as well as the radio telecommunications system and thus be able to offer both types of service, i.e. mobile telephones and fixed transceivers such as fax machines. This has the disadvantage that the provider must install and maintain two differing sets of equipment.
- the present invention relates to a first method of providing fixed terminal access to a mobile telecommunication network, subscriber's mobile stations in the mobile telecommunications network being addressable by subscriber information references, the method comprising the steps of: providing a first interface unit between the mobile telecommunications network and a wireline network; providing a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable with a subscriber information reference of the mobile telecommunications network and being connected to a local loop of the wireline network; and providing services of the mobile telecommunication network to and from the subscriber's fixed terminal through the first interface and the wireline network.
- the first interface unit may be a access node of the mobile telecommunications network in trunked communication with the wireline.
- the first interface unit may be connected between a mobile switching center of the mobile telecommunications network and the wireline network.
- the provision of services may include routing calls from the subscriber's fixed terminal destined for the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first interface unit and the wireline network.
- the first method may include provision of a second interface unit between the wireline network and the fixed terminal of a subscriber of the mobile telecommunications network and providing mobile telecommunication network services through the first and second interfaces and the wireline network.
- the first method also includes routing calls from the subscriber's fixed terminal destined for the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first and second interface units and the wireline network.
- at least portions of messages from the mobile telecommunications network are encapsulated by the first interface unit so that they are transmitted transparently through the wireline network.
- at least portions of the messages from the fixed subscriber terminal are encapsulated by the second interface unit so that they are transmitted transparently through the wireline network.
- the wireline network may be a PSTN and the first and second interface units are each provided a directory number within the PSTN.
- Each wireline of the PSTN may include one or more bearer channels and a data channel and data channel messages from the PSTN are terminated at the second interface unit.
- the second interface unit may be connected to an S/T bus and the second interface unit preferably converts incoming messages from the PSTN to S/T bus format and converts outgoing messages from the S/T bus format to a PSTN format.
- the second interface unit preferably assigns data and bearer messages from the PSTN to appropriate channels on the S/T bus.
- the present invention may also relate to a first system for providing fixed terminal access to a mobile telecommunications network, comprising: a first interface unit between the mobile telecommunications network and a wireline network; a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable by a subscriber information of the mobile telephone network and being connected to the local loop of the wireline network; and the first interface unit having means for transmitting any message associated with the subscriber's fixed terminal through the first interface unit and the wireline network.
- the first interface unit may be an access node of the mobile telecommunications network in trunked communication with the wireline.
- the first interface unit may be connected between a mobile switching center of the mobile telecommunications network and the wireline network.
- the first interface unit may adapted to encapsulate at least a portion of a message from the mobile telecommunications network so that it is transmittable transparently through the wireline network.
- a second interface unit may be provided between the wireline network and the fixed terminal of a subscriber.
- the first system may include means for routing calls from the subscriber's fixed terminal destined to the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first and second interface units and the wireline network.
- the second interface unit may be adapted to encapsulate at least a portion of a message from the fixed subscriber terminal so that it is transmittable transparently through the wireline network.
- the wireline network may be a PSTN and the first and second interface units are each provided with a directory number within the PSTN.
- Each wireline of the PSTN may include one or more bearer channels and a data channel and the second interface unit includes a terminator for the data channel messages from the PSTN.
- the second interface unit may be connected to an S/T bus and the second interface unit may then be adapted to convert incoming messages from the PSTN to S/T bus format and outgoing messages from the S/T bus format to an appropriate PSTN format.
- the second interface unit may be adapted to assign data and bearer messages from the PSTN to appropriate channels on the S/T bus.
- the present invention may also include a first interface unit for connection between a fixed terminal at a subscriber's premises and a wireline network, the interface unit comprising: a processor for processing messages between a mobile telephone network and the fixed terminal via the wireline network, the processor being adapted to encapsulate at least a portion of an outgoing message in the mobile telephone network format from the fixed terminal in an appropriate wireline format so that the outgoing message from the fixed terminal is transmittable transparently through the wireline network to the mobile telephone network.
- Each wireline of the wireline network may include one or more bearer channels and a data channel, the interface unit further comprises a terminator for terminating wireline data channel messages.
- the wireline network may be a PSTN.
- the first interface unit may include means for routing calls through the PSTN.
- the present invention may include a second interface unit for connection between a wireline network and a mobile telephone network, the interface unit comprising: a processor for processing messages to be transmitted between a mobile telephone network and a fixed terminal at a subscriber's premises via the wireline network, the processor being adapted to convert incoming messages in a wireline network format to a mobile telephone network format and to encapsulate at least a portion of an outgoing message having the mobile telephone network format in an appropriate wireline network format so that the outgoing message from the mobile telephone network is transmittable transparently through the wireline network to the fixed terminal at the subscriber's premises.
- the wireline network may be a PSTN.
- the second interface unit may include means for routing calls through the PSTN
- the present invention also includes a second telecommunications system comprising: a first radio telecommunications network having at least one radio coverage and a switching controller for generating and transmitting control signals of a first format; and a second telecommunications network including at least one subscriber terminal; the system further comprising: means for storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points, the storing means is adapted to provide the first radio telecommunications network with at least verification information relating to a subscriber of the group; and access node means, the first radio telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call to the access node means and the access node means terminates control signals of the first format from the switching controller and transfers the call to the subscriber terminal in the second telecommunications
- the subscriber terminals may terminate local wire loops of the second telecommunications network.
- the storing means may be located at at least one premises of the group of subscribers.
- the storing means may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by first the radio telecommunications network.
- the access node may located at the premises of the group of subscribers.
- the access node means may be adapted for two-way communication with the switching controller.
- the access node means may also include means for decoding and coding voice messages, e.g. vocoding.
- the access node may include the storing means and the access node may also be remote from the premises of the group of subscribers.
- the storing means may include a programmable read only memory for storing the subscriber identifier.
- the storing means is preferably adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention also includes a first access node for use with a radio telecommunications network, comprising: communication means for receiving signals from, and transmitting signals to the radio telecommunications network in a first format; means for storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node, the storing means being adapted to provide the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers; and the access node being adapted so that when a call is placed to a subscriber in the group via the radio telecommunications network, the access node terminates control signals of the first format from the radio telecommunications network and transfers the call to the output port associated with the called subscriber.
- the storing means may be located at the premises of the group of subscribers.
- the storing means may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications system.
- the first access node may be located at the premises of the group of subscribers.
- the first access node may also include means for decoding and coding voice messages, e.g. vocoding.
- the access first node may be remote from the premises of the group of subscribers.
- the storing means may include a programmable read only memory for storing the subscriber identifier.
- the storing means may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention may include a first responder suitable for use in a network-wise geographically fixed position in a first telecommunications network, comprising: means for storing at least one subscriber identity information of a subscriber to a second radio telecommunications network and a key; verification means for generating a result of an encryption algorithm with the aid of the key; and means for transmitting the result towards the second radio telecommunications network via the first telecommunications network.
- the responder may also include communication processing means for receiving an alphanumeric message and control data from the second radio telecommunications network via the first telecommunications network and for transmitting only the alphanumeric message to the verification means.
- the present invention may also include a second method of operating a telecommunications system including a first radio telecommunications network having at least one radio coverage area and a second telecommunications network including subscriber terminals, the method comprising the steps of: storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points; providing the first radio telecommunications system with at least verification information relating to a subscriber of the group based on the stored subscriber identifier information when a request therefor is sent from the first radio telecommunications system; and when a call is placed to a subscriber in the group: the first radio telecommunications network generates control signals of a first format and transmits the control signals and the call to an access node means; and the access node means terminates the control signals of the first format and transfers the call towards the subscriber terminal in the second
- the providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the first radio telecommunications network, and transmitting the result to the first radio telecommunications network.
- the providing step may also include sending the alphanumeric indication to a responder at the premises of the subscriber, computing the result in the responder ad transmitting the result to the access node means.
- the second method may also include the step of decoding and coding voice messages in the access node means.
- the second method may include providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention may also include a third method of operating an access node for use with a radio telecommunications network, comprising: storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node; providing the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers on request; and when a call is placed to a subscriber in the group: receiving control signals of a first format and the call from the radio telecommunications network, and terminating the control signals of the first format and transferring the call to the output port associated with the called subscriber.
- the providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network, and transmitting the result to the radio telecommunications network.
- the providing step may also include sending the alphanumeric indication to a responder at the premises of the subscriber, computing the result in the responder and transmitting the result to the access node.
- the third method may also include the step of decoding and coding voice messages in the access node.
- the third method may also include the step of providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention may also include a fourth method of operating a responder in a network-wise geographically fixed position in a first telecommunications network, comprising: storing in the responder at least one subscriber identity information of a subscriber to a second radio telecommunications network and a key; generating a result of an encryption algorithm with the aid of the key; and transmitting the result towards the second radio telecommunication network via the first telecommunications network.
- the generating step may include receiving an alphanumeric message and control data from the second radio telecommunications network and for transmitting only the alphanumeric message to means within the responder for verification of the responder and its associated subscriber.
- the present invention may also include a third telecommunications system comprising: a first radio telecommunications network having at least one radio coverage area and a switching controller; and a second telecommunications network including at least one subscriber terminal; the telecommunications system further comprising: means for storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the second subscriber identifier being associated with one subscriber of the group, the storing means being associated with at least a responder in a network-wise geographically fixed position for providing the first radio telecommunications network with at least verification information relating to a subscriber of the group; the first radio telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call towards the location of the storing means, in response thereto the responder provides verification information of the called subscriber to the radio telecommunications network and the call is transferred to the subscriber terminal in the second telecommunications network.
- the subscriber terminals may terminate local wire loops of the second telecommunications network.
- the storing means and the responder may be located at at least one premises of the group of subscribers.
- the responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by first the radio telecommunications network.
- the responder is preferably adapted for two-way communication with the switching controller.
- the responder may be located at the premises of the group of subscribers but the storing means may be remote from the premises of the group of subscribers.
- the storing means may include a programmable read only memory for storing the subscriber identifier.
- the responder may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention also includes a second access node for use with a radio telecommunications network, comprising: communication means for receiving signals from, and transmitting signals to the radio telecommunications network; means for storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node, a responder adapted to provide the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers; and the access node being adapted so that when a call is placed to a subscriber in the group via the radio telecommunications network, the access node transfers the call to the output port associated with the called subscriber.
- the storing means may be located at the premises of the group of subscribers.
- the responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications system.
- the second access node may be located at the premises of the group of subscribers. Alternatively, the second access node means may be remote from the premises of the group of subscribers.
- the second access node may also include means for decoding and coding voice messages.
- the storing means may include a programmable read only memory for storing the subscriber identifier.
- the responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network.
- the second access node may also include means for decoding and coding voice messages, e.g. vocoding.
- the responder may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention also includes a fifth method of operating a telecommunications system including a first radio telecommunications network having at least one radio coverage area; and a second telecommunications network including subscriber terminals, the method comprising the steps of: storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group; and when a call is placed to a subscriber in the group: the first radio telecommunications network transmits the call towards the storing means; in response thereto, transmitting to the first radio telecommunications system from a responder in a network-wise geographically fixed position at least verification information relating to the called subscriber based on the stored subscriber identifier information; and transferring the call to the subscriber terminal in the second telecommunications network.
- the step of transmitting verification information may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the first radio telecommunications network, and transmitting the result to the first radio telecommunications network.
- the fifth method may include the step of decoding and coding voice messages.
- the fifth method may include providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- the present invention may also include a sixth method of operating an access node for use with a radio telecommunications network, comprising: storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node; and when a call is placed to a subscriber in the group: providing the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers from a responder in a network-wise geographically fixed position; and transferring the call to the output port associated with the called subscriber.
- the providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network, and transmitting the result to the radio telecommunications network.
- the sixth method may also include the step of decoding and coding voice messages.
- the sixth method may also include the step of providing the first radio telecommunications network with authentication information of a subscriber.
- the present invention deviates radically from conventional systems in that it may provide geographically fixed receiver functionality for the subscriber information which specifies the subscriber's identity in a mobile telecommunications system. This is achieved in accordance with the present invention by associating the Subscriber Identification Information (SII) with a fixed geographical reference point rather than with a particular device.
- SII Subscriber Identification Information
- the access point lies outside the radio telecommunications system.
- the control signals of the mobile telephone system are transmitted right up to the subscriber's premises.
- the control signals of the mobile telecommunications system may be terminated in an access node which may be conveniently located in a wired base station.
- control signals of the mobile telecommunications system such as the DTAP signals
- the voice coding typically used in mobile telecommunications systems is terminated at the access node and not at the customer premises.
- the functions of the access node described above may be shared between an access base station and responders on the customer's premises.
- the responder is capable of responding to certain inquiries initiated in the wireless network, e.g. to provide subscriber identity information or to provide the result of an encryption algorithm carried out on a random number supplied from said wireless network.
- the present invention allows integration of a radio telecommunications network with another telecommunications network, particularly a wireline network. This may provide the advantage of improved subscriber services, in particular to allow a wireless system operator to provide greater bandwidth and additional services in an economical way without duplicating networks.
- a wireline network 10 is connected to a wireless network 20.
- the wireless network 20 as shown is of the switched node type but the present invention is not limited thereto.
- the wireless network 20 could be implemented as an intelligent network.
- the wireless network 20 is a GSM type system but the invention is not limited thereto.
- the GSM network 20 may cover several countries and may be divided into national GSM networks (PLMN) service areas. There may also be several GSM networks within one country operated by different providers and their respective coverage areas may overlap.
- PLMN national GSM networks
- the conventional wireline network 10 has conventional terminating devices such as telephones 11 or fax machines or a permanently responding terminal 12.
- the terminal 12 may be answering machine or a voice mail box or a personal computer (PC) configured to receive and store fax and other data transmissions as well as voice messages.
- the wireless GSM network 20 may include one or more regions each associated with a mobile services switching center (MSC) 21, 27-29.
- MSC mobile services switching center
- the connection between the wireline network 10 and the wireless network 20 is via a particular type of MSC known as a gateway mobile services switch center (GMSC) 21.
- the GMSC 21 is connected to a Home Location Register (HLR) 26 and the other MSC's 27 - 29.
- HLR Home Location Register
- the HLR 26 is a database which stores subscriber data, such as location data and Subscriber Identification Information (SII).
- Each MSC 21, 27-29 serves an area which may include one or more radio coverage areas associated with radio transceivers or base stations (BS) 34-36.
- BS base stations
- Each MSC 21, 27-29 may service several BS's 34-36.
- the smallest location area of the network 20 is called a cell.
- a visitor location register (VLR, not shown) which is a database which stores information of the location of mobile transceivers 22-25 visiting the area controlled by the respective MSC 21, 27-29.
- the HLR 26 in turn stores information with respect to which VLR/MSC 21, 27-29 a particular mobile transceiver 22-25 is visiting which is used for routing purposes.
- a call from the wireline network 10 is received at the GMSC 21, alternatively, a call from one of the mobile transceivers 22-25 is received at the respective MSC, 21, 27-29.
- the HLR 26 is interrogated as to routing.
- the call is then completed with one of the mobile phones 22-25. If the mobile phone 22, 23; 24; 25 is in its home area, the call is routed through the respective home MSC 27; 28; 29. If the mobile phone 22 - 25 is roaming, the respective MSC 27; 28; 29 responsible for radio coverage area in which the mobile device is located, acts as the visited MSC or VMSC. Communications between the GMSC 21 and the other MSC's 27 - 92 are carried out by lines 32.
- the MSC's 21, 27 - 29 may be connected to base stations (BTS) 34 - 36 via intermediate base station controllers (BSC, not shown).
- the subscriber identification information includes the International Mobile Subscriber Identity IMSI which comprises a GSM mobile country code MCC (three digits), a mobile network code MNC (two digits) and a mobile station identification number MSIN (ten digits).
- the MSIN is unique within a certain national GSM network and can be specified by the network provider.
- the SII is stored in a subscriber information storing means or SISM.
- the SISM is a separate Subscriber Identity Module (SIM) in each mobile transceiver or mobile station MS 22-25.
- SIM Subscriber Identity Module
- An SIM is a module separate from any memory or processor used for establishing communication between a mobile station and the network 20.
- the means for storing the SII is detachable or removable, e.g. in the form of a SIM integrated circuit card or SIM-ICC.
- the SIM-ICC is used in the GSM for at least three important functions:
- verification means confirming that a communication with a particular subscriber terminal has been made. For example, this includes verification that a subscriber may use the facilities of the radio telecommunications network or confirmation that the terminal contacted is the right one. Further, verification is required in a mobile telephone system on a call-by-call basis for billing purposes.
- Authentication means in accordance with the present invention that information is provided from which a check can be made that a specific subscriber's identity has been registered in the radio telecommunications network. Authentication is linked to the subscriber's identity as defined by the subscriber identity information and is required by the radio telecommunications network as this information relates to the confirmation that the particular subscriber may access certain services provided by the radio telecommunications network and associated only with that subscriber. Hence, more information may be required for authentication than for verification. For instance, the authentication information may include which services the subscriber may use.
- the means for storing the SII (the SISM) in a mobile station is protected against unauthorized direct entry (this includes the subscriber).
- Integrated circuit SIM cards are designed to be very difficult to duplicate (except by the issuer who is usually a network provider or operator). Further details of the GSM system may be found, for instance, in the book by Michel Mouly and Marie-Bernadette Pautet, "The GSM system for Mobile Communications", Cell & Sys, 1992.
- the wireless network 20 also includes access node means 48 for associating the Subscriber Identification Information (SII) with a fixed geographical reference point.
- SII Subscriber Identification Information
- embodiments of the present invention may include a access base station (ABS) 40, operatively connected on one side to one of the MSC's (28) and on the other side to a secondary network 30 which may be a further wireline network but the present invention is not limited thereto.
- the ABS 40 does not need to have a radio coverage area and can be connected via the secondary network 30 to one or more fixed terminal devices 45 - 47.
- Wireless telephone networks generally have no method of linking a subscriber to a particular access point.
- the access node means 48 in accordance with the present invention provides fixed geographical access points to the wireless network for the terminal devices 45 - 47 and the relevant group of subscribers.
- the devices 45-47 are effectively part of a virtual cell which is not part of a radio coverage area of the mobile network 20.
- the access node 48 may be provided by a separate converter 70, the ABS 40 or by the ABS 40 in combination with other devices such as a responder 77 as will be described later.
- a fixed geographical access point does not include within its meaning simply restraining a mobile station, e.g.
- the subscriber identity Information (SII) handled by the access node does not provide mobility in the GSM network 20.
- SII subscriber identity Information
- any SII associated with a access node may be restricted to the virtual cell associated with the access node. Any attempt to extract the SII and use it in a mobile station will fail, as the first attempt at location updating in the mobile system 20 will result in interrogation of the HLR 26 and access will be denied as the mobile station will not be in the virtual cell associated with access node.
- Fig. 2 shows schematically a second embodiment of the present invention.
- the secondary network 30 is a wireline network and the access base station 40 is provide by a wired base transceiver station (WBTS) 50.
- the access node in accordance with this embodiment is provided by a converter 70.
- Other details of the network are as described with respect to Fig. 1.
- One or more WBTS 50 and one or more conventional base transceiver stations (BTS) 37 may be included in a Base Station Subsystem 39 (BSS).
- the conventional BTS 37 controls a radio access coverage area 43 and is adapted to receive and transmit messages via radio channels to the mobile stations 22-25.
- the WBTS 50 and BTS 37 may be connected to a base station controller BSC 38 which in turn, is connected to the MSC 28 as part of the network and switching sub-system (NSS) 41 of a GSM network.
- Terminal devices 56 -60 are connected by wire lines 51 to 55 to the WBTS 50.
- the wire lines 51 - 55 not only carry the user messages or "traffic" but also carry signals necessary for controlling calls.
- Wire lines 51 - 55 may be leased lines from a local public telephone utility.
- the signaling protocols used are those of the wireless network 20 e.g. the DTAP signals between the MSC 28 and a mobile device 22-25. As shown in Fig.
- a conversion device 70 is provided on the subscriber's premises and therefore provides geographically fixed access points to the radio telecommunications network 20.
- Converter 70 contains at least one and usually two subscriber information storing means (SISM) 71, 72 which may be detachable and are preferably protected against direct entry, e.g. some kind of SIM, particularly SIM-ICC's with the associated ICC readers.
- SIM-ICC's subscriber information storing means
- terminal devices 56 - 60 are ISDN telephones, normally two independent telephone line connections (i.e. two directory numbers) are provided for one ISDN connection to a subscriber's premises.
- SII's are stored in the converter 70 for use with the mobile network 20 rather than directory numbers, hence, the need for two SISM's 71, 72.
- the SISM's 71, 72 are necessary so that the terminal devices 56 to 60 on the wireline part of the system appear to the wireless system 20 like any other mobile telephone used on the wireless system 20.
- the SISM's 71, 72 contain the subscriber identity information which is also stored in the HLR 26 along with the relevant routing information.
- the converter device 70 terminates the wireless system control signals, e.g. DTAP signals which are normally transmitted between a mobile station and an MSC, and forwards the user messages or "traffic" to the terminal device 56 or 57 as well as any control signals required for call processing in the format of the terminal devices, e.g. in that of a conventional ISDN telephone wireline system if the terminal devices 56, 57 are standard ISDN telephones. All services are terminated at the converter 70.
- the control signals and the user messages from the MSC 28 are passed through the BSC 38 and the WBTS 50 transparently.
- the converter 70 emulates all the functions of a mobile transceiving device while using a wired interface for transmission and reception instead of a radio interface. Once the converter 70 is in service, the operation is indistinguishable from a normal radio interface. For instance, if the wireless system 20 is a GSM system and the subscriber's terminal equipment 56, 57 uses ISDN signaling, the subscriber is sold or rented a converter 70 that, for instance, contains two SIM-ICC's 71, 72. All service and service inquiries with the SIM-ICC's 71, 72 can be handled locally by the converter 70. The converter 70 terminates all mobile network signaling, e.g.
- DTAP signaling from the MSC 28, and converts it to ISDN Q931 signaling for the subscriber's terminal equipment 56, 57.
- Outgoing control signals from the subscriber's terminal equipment 56, 57 are converted to DTAP signals and provided with identification information using data stored on one of the SIM-ICC's 71, 72.
- the WBTS 50 does not, as a rule, query the SIM-ICC's 71, 72.
- the exact functions to be performed by the converter 70 depend upon the compression and coding techniques used for the air interface 44 of the radio telecommunications system 20. Generally, every effort is made to reduce bit rate on the air interface 44 by compression of signals. This is particularly true of voice signals which take up a lot of band width if not compressed.
- Telephone calls from an MS 22 - 25 enter the system at the BTS 37 in a compressed or coded form. At some point these signals must be rate adapted to landline bit rates and, if necessary decoded. This is done usually in a Transcoder and Rate Adapting Unit (TRAU) which may be placed in the BTS 37, the BSC 38 or closer to the MSC 28.
- TAU Transcoder and Rate Adapting Unit
- the signals enter or leave the TRAU 42 on the mobile station side at 16kB/s and the voice signals are vocoded and leave or enter the TRAU 42 respectively on the MSC 28 side at 64kB/s and the voice signals are coded in the A- or ⁇ law.
- Vocoding is any method of compressing voice signals and one definition may be the analysis and synthesis of voice, which uses either a vocal track model or quantizes subbands of a speech waveform to remove redundant speech information thereby enabling transmission of the required voice information in a reduced bandwidth.
- the TRAU 42 was placed in the BTS 37 (first alternative in Fig. 4).
- the access 48 in accordance with the present invention receives uncompressed voice signals and data signals at 64kB/s from the MSC 28 (indicated by the dotted line arrow leaving BSC 38 towards ABS 40 in the upper alternative of Fig. 4). These can be converted easily into ISDN standard signals in the converter 70.
- the ABS 40 may include, even if the TRAU 42 is normally in the BTS 37, a TRAU 42 in order to exactly emulate the rest of the wireless network 20.
- the converter 70 also has to include a TRAU 42 in order to carry out the vodecoding and rate adaption to the system of the terminal devices 56 - 60, e.g. 64kB/s of the ISDN.
- the TRAU 42 may be placed in the BSC 38 or be associated more closely with the MSC 28 (second and third alternatives in Fig. 4). If the access node 48 in accordance with the present invention is connected to a standard BSC 38 in such a GSM system, it receives vocoded speech and signals at 16kB/s (indicated by the line arrows leaving BSC 38 towards ABS 40 in the lower two alternatives of Fig. 4). In accordance with a modification of the second embodiment of the present invention these compressed signals are passed to the converter 70 which includes a TRAU for vodecoding and rate adaption of messages so that they are adapted to the system used by the terminal devices 56 - 60, e.g. 64kB/s of ISDN. Placing the TRAU 42 closer to the MSC 28 in the GSM system reduces the cost of leased lines as compressed signals are transmitted along the leased lines, therefore requiring less capacity.
- the access 48 may be connected to an MSC 28 (shown by the arrows on the right hand side of Fig. 4 which indicate a connection at 64 kB/s directly to ABS 40) or through a special BSC 38 in such a way that 64kB/s A- or ⁇ -law coded uncompressed signals are received by the converter 70, i.e. by bypassing the conventional TRAU 42.
- MSC 28 shown by the arrows on the right hand side of Fig. 4 which indicate a connection at 64 kB/s directly to ABS 40
- a special BSC 38 in such a way that 64kB/s A- or ⁇ -law coded uncompressed signals are received by the converter 70, i.e. by bypassing the conventional TRAU 42.
- the secondary network 30 includes some form of radio communication or if there is a possibility that lines 51 - 55 are unsafe, e.g. unsafe leased lines, it is preferred if the SISM's, e.g. SIM-ICC's, in converter 70 also include ciphering keys and the converter 70 is capable of ciphering messages involving subscriber identity information transmitted from the SISM and for deciphering messages from the MSC 28 involving such data. Such a capability may be provided by a SIM-ICC. If no radio communication is required in the secondary network, e.g. it is a wireline network, ciphering is not preferred in accordance with the present invention.
- Fig. 5 One possible message sequence for setting up a call in accordance with the present invention is shown schematically in Fig. 5.
- the HLR 26 and the home MSC 28 need to be informed of the existence of the active SISM's 71, 72 which may be SIM-ICC's.
- the converter 70 with the SIM-ICC's 71, 72 has been installed, the operation of the complete system is relatively simple.
- the converter 70 sends a request for a location update.
- this message is called a Location Update Request (LUR) and is part of the RIL3-MM protocol.
- the LUR contains enough information to identity the subscriber. For instance, the LUR may contain the IMSI mentioned above.
- the request may contain a Temporary Mobile Subscriber Identity TMSI as is known from the GSM system.
- the MSC 28 may respond immediately to the converter 70 or may interrogate the HLR 26. From the LUR, the MSC 38 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto. The answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message.
- the messages between the MSC 28 and the HLR 26 are part of the MAP/D protocols and are not discussed here in detail. It should be noted that location updating may still be required even though there is only one possible "location" for the SIM-ICC's 71 and 72, as it may be necessary to restore the databases in the VLR or the MSC 28 after failures.
- MSC 28 may request authentication from the converter 70. It is preferred if authentication is of the active type with an exchange between the converter 70 and the MSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this the MSC sends an Authorization Request which is also part of the GSM RIL3-MM protocol.
- the Authorization Request contains a randomly generated number RAND which is to be processed by the converter 70.
- Converter 70 requests one of SIM-ICC's 71, 72 to generate a response, the SRES, from the RAND preferably using a algorithm such as A3 which is a one-way or trap-door function.
- Converter 70 responds to MSC 28 with the SRES.
- the MSC 28 compares the SRES from converter 70 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and same Ki for the subscriber involved. If both agree, converter 70 is now registered in wireless network 20 as if it were a mobile station.
- Alternative methods are included in accordance with the present invention, e.g. different keys may be used by the converter 70 and the HLR 70.
- a call to one of the terminal devices 56, 57 is completed in the following way.
- Terminal devices 56, 57 have numbers assigned for the wireless network 20.
- a call to these devices 56, 57 will therefore either be generated within wireless network 20 or will be directed to wireless network 20 through a GMSC such as 21.
- GMSC such as 21.
- the routing information to the respective MSC 28 is stored in the HLR 26.
- the wireless network 20 it sees the SISM's 71, 72 in converter 70 just as if they were SIM-ICC's in conventional mobile stations.
- Any call to one of the terminal devices 56, 57 is routed by the HLR 26 to the MSC 28, and via the BSC 38 and the ABS 40 as, for instance, exemplified by the WBTS 50 and so to the converter 70.
- the converter 70 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented.
- the 16kB/s coded messages are decoded in converter 70 to 64kB/s A- or ⁇ -law signals.
- control signals are converted to ISDN format and the call is transferred to the relevant terminal device 56, 57.
- MSC 28 sends a Setup Request to converter 70.
- This request is also part of the RIL3-CC protocol of GSM.
- This request is received by converter 70 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of the ISDN terminal devices 56, 57.
- the relevant device 56, 57 responds with a Call Proceeding message.
- the converter 70 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol.
- Converter 70 operates in this case as a protocol interworking device. The call setup is now complete and the call may continue.
- Fig. 6 is a schematic representation of a converter 70 in accordance with a further embodiment of the present invention capable of carrying out the message sequence of Fig. 5.
- Converter 70 may include two communication lines 67, 68 for communication between ports 66 of converter 70 and the terminal device 56 and the ABS 40 of network 20, respectively.
- Converter 70 may also include a communication processing means 64 in the form of a conventional programmable microprocessor or microcontroller for processing data from, and preparing data for transmission to the terminal device 56 or to the ABS 40.
- the processing means 64 may include a TRAU 42 depending upon which embodiment of the present invention is implemented.
- Processing means 64 preferably includes some memory 65 for storing of programs, data, etc.
- Processing means 64 may also provide the protocol conversion and rate adaption between the ISDN system on one side and the wireless network 20 on the other.
- Converter 70 also preferably includes a Secure Access Module 61 or SAM.
- This SAM 61 stores personal confidential data such as the IMSI and the key Ki in an authentication memory 63 as well as the authentication algorithms, e.g. A3.
- the SAM 61 also preferably includes a secure processor 62 for calculating SRES (and if required, the dormant key Kc) from the random number RAND.
- SAM 61 may be implemented as an Integrated Circuit Card, i.e. it may be a SIM-ICC with an appropriate reader as is known from GSM mobile stations.
- One advantage of the system in accordance with the above embodiments is that standard terminal devices 56- 60 may be used, e.g. ISDN telephones.
- Another advantage of the system is that the control signals and other aspects of the wireless network 20 such as voice coding must be taken right up to the customers premises. This allows flexibility.
- value added services may be provided in wireless network 20 which may need to be emulated in the converter 70, e.g. speed dial numbers or customized short messages services (SMS). This requires each converter 70 to include a processor to carry out the complex coding/decoding routines and rate adaption and to provide the value added services. This can make each converter 70 more expensive.
- the number of connections to the ABS 40 may increase, for instance 120 or more subscribers per WBTS 150.
- the WBT5 150 may be physically located within the central office of the local telephone utility although it may belong to the operator of the wireless network 20.
- the access node 48 is provided by a single node of the network 20, e.g. by ABS 40.
- the processing power and the SISM's of the converters 70 described in the second embodiment may be concentrated in the ABS 40, e.g. in WBTS 150.
- Access node 48 may be a wired BTS (WBTS 150).
- WBTS 150 wired BTS
- Reference numerals in Fig. 8 which are the same as reference numbers in Figs. 1 to 7 refer to the same components. It is understood that the MSC 28 shown in Fig. 7 interfaces with the wireless and wireline networks 20, 30 as shown in Fig. 1.
- the WBTS 150 in accordance with the third embodiment may be the ABS 40 communicating with terminal devices 45 - 47 via a secondary network 30 which may be any transmission network of which a wireline network is only one example.
- messages from MSC 28 are transmitted to the WBTS 150 via the BSC 38.
- the WBTS 150 includes a plurality of SISM's 73, 74, e.g. if there are 120 subscriber loops connected to the WBTS 150, there would be 240 SISM's 73, 74. All control signals from the wireless network 20 are terminated in the WBTS 150 and any necessary vodecoding and rate adaption are performed in the WBTS 150 before transmitting the signal to the terminal devices 56, 57 in the customer premises in the standard format for the secondary network 30, e.g. ISDN. Further, a processor in WBTS 150 is adapted to carry out the value added services and to provide the necessary storage space for the SMS (short message service).
- the wire lines 51, 52 may be terminated by an ISDN NT1 device 49 as is customary for ISDN. No decoding or rate adaption or value added service processing is performed at the customer premises. Instead, ports of the WBTS 150 provide the geographically fixed access point for the wireless network 20. WBTS 150 may be located in the wireless network 20. All signals which leave the WBTS 150 towards the terminal devices are in the format of the secondary network 30. All signals which leave the WBTS 150 towards the MSC 28 are in the format of the wireless network 20. Accordingly, control signals such as DTAP for the wireless network 20 towards the MSC 28 are generated in WBTS 150, and all DTAP signals received from the MSC 28 are terminated at the WBTS 150.
- the SISM's 73, 74 may be in the form of SIM-ICC's inserted into a suitable receiving and reading devices (not shown). However, the location of so many physical cards within the WBTS 150 takes up a lot of space. Further, there is a significant possibility that one or more SIM-ICC's may not be placed into the correct slot leading to difficulties in billing, maintenance and problem tracking.
- the subscriber identity information is stored in the access node 48 in a more convenient form, e.g. as an insertable programmable read only memory (PROM) block or as software representations of SII's, i.e. a virtual SIM or VSIM, in which the SIM is stored on access node 4 in conventional non-volatile memory.
- PROM insertable programmable read only memory
- the GSM specifications specify a SIM-MS interface that allows value-added service information to be stored within the SIM. Examples are speed dial numbers or customized Short Message Service (SMS) text strings.
- SMS Short Message Service
- the access node 48 stores such information in non-volatile memory capable of surviving shut down and re-boot.
- the software running on the processor of access node 43 may handle the virtual MS-SIM interface and support the conventional SIM/MS services behavior.
- Access node 48 includes communication connections 101, 102 for transmitting signaling and user messages, respectively, to and from the wireless network 20 via ports of switching means 93. These connections are normally made with an MSC 28 as described above.
- the signaling and message connections 101, 102 may be, for example, different channels of a TDMA communications system between the MSC 28 and the access node 48.
- the communications connections 101, 102 may be any suitable form of connection, e.g. a wireline or wirelines or a microwave link.
- Access node 48 also includes signaling and user message communications connections 103, 104, respectively, for transmission to and from the secondary network 30, e.g.
- Communications connections 103, 104 may be any suitable connections, e.g. for a WBTS 150 the connections 103, 104 are represented by a wireline 51, 52 connected to the respective port of switching means 93, however, the invention is not limited to a wired BTS 150.
- the blocks in Fig. 9 represent certain functions of the access node 48. They do not necessarily represent individual hardware elements of the node 48.
- the functions to be described with respect to node 48 may be implemented in a variety of ways, e.g. by conventional processors running associated software specifically adapted to perform the functions in accordance with the present invention and memory devices, e.g. disc drives, as well as other communications peripheral equipment, e.g. suitable ports and digital switches.
- the node 48 may be controlled by a node controller 91 which may be a processor which carries out common functions necessary to control the node 48.
- the node controller 93 controls and co-ordinates the functions of the voice processor 96, the operations and maintenance unit 97, the signaling interworking unit 92 as well as the switching means 93.
- the voice processor 96 may include a transcoder and rate adapter to code and decode between the compressed voice data from the wireless network 20 and the uncompressed voice data transmitted to and from the end terminals 56, 57.
- the signaling interworking unit 92 terminates the signing messages (represented by block 94) in the format of the wireless network 20 as well as terminating the signaling messages (represented by block 95) in the format of the secondary network 30.
- Signal interworking unit 92 converts signal formats between the wireless network 20 and the secondary network 30.
- Switching means 93 provides connections to and from the ports of the access node 48 as well as routing signals to the appropriate processors within access node 48.
- Access node 48 also includes a store 98 for the subscriber identity information (SII), e.g. for storing the SII 73, 74 of WBTS 150.
- This store may be in the form of an addressable read only non-volatile memory, e.g. a detachable block of programmable read-only memory, which has been pre-programmed with the subscriber identity information such as the IMSI and the private key K i .
- the encryption algorithms may be stored in the same store 98 and may be executed by the node controller 91 or by a separate dedicated authentication processor (not shown).
- the SII store 98 may also be conventional addressable non-volatile memory storage, i.e. e.g.
- the SII store is then described in accordance with the present invention as a Virtual Subscriber Identity Module or VSIM.
- the store 98 may be a plurality of SIM-ICC's, each slotted into a respective card reader (not shown).
- the signaling and user message are each directed to the relevant processing means 92, 94, 95; 96.
- Signals from the wireless network 20 are terminated at 94 and the signals converted into the format of the secondary network in the signaling interworking unit 92 as well as any rate adaption necessary between the wireless network 20 and the secondary communications network 30.
- User messages in the form of voice or data information are directed to the voice processor 96 which carries out any rate adaption and transcoding required and prepares the messages for transmission in the secondary network 30.
- the converted signaling information as well as the voice and/or data messages from the voice processing unit 96 is then transmitted to the secondary network 30 via the unit 95, the switching means 93 and its ports and the relevant communications connections 103, 104.
- FIG. 10 A possible message sequence for the third embodiment is shown schematically in Fig. 10.
- the access node 48 e.g. a WBTS 150
- the access node 48 generates a LUR using the subscriber identity information from the relevant SII 73, 74 in store 98 and sends the LUR to the MSC 28 under the control of the node controller 91 and the switching means 93.
- the MSC 28 may respond immediately to the access node 48 or may interrogate the HLR 26.
- the MSC 38 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto.
- the answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message. It should be noted that location updating may still be required even though there is only one possible "location" for the SII's 73 and 74, as it may be necessary to restore the databases in the VLR (visiting location register) or the MSC 28 after failures.
- MSC 28 may request authentication from the access node 48. It is preferred if authentication is of the active type with an exchange between the access node 48 and the MSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this the MSC sends an Authorisation Request containing the randomly generated number RAND which is to be processed by the access node 48. The access node 48 generates a response, the SRES, from the RAND preferably using an algorithm such as A3 which is a one-way or trap-door function. To do this, the node controller 91 of the access node 40 retrieves the private key Ki stored as part of the relevant SII 73, 74 from SII store 98.
- the node controller 91 calculates the SRES using the relevant algorithm and responds to the MSC 28.
- the MSC 28 compares the SRES from the access node 48 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and same Ki for the subscriber involved. If both agree, the SII's 73, 74 of access node 48 are now registered in wireless network 20 as if they belonged to a mobile station.
- the routing information to the respective MSC 28 is stored in the HLR 26. Any call to one of the terminal devices 56, 57 is routed by the HLR 26 to the MSC 28, and via the BSC 38 to the access node 48.
- the access node 48 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented.
- the 16kB/s coded messages are decoded in access node 40 to 64kB/s A- or ⁇ - law signals. For both 16kB/s or 64kB/s messages, control signals are converted to ISDN format and the call is transferred to the relevant terminal device 56, 57.
- MSC 28 sends a Setup Request to access node 48.
- This request is also part of the RIL3-CC protocol of GSM.
- This request is received by access node 48 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of the ISDN terminal devices 56, 57.
- the relevant device 56, 57 responds with a Call Proceeding message.
- the access node 48 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol.
- the call setup is now complete and the call may continue.
- the access node 48 operates in this embodiment as a protocol interworking device.
- SIM-ICC's 75 SIM's 73, 74 and virtual SIM's 76 is shown schematically in Fig. 11.
- the SIM card 75 is usually purchased from an independent SIM card supplier who provides not only a completed SIM card 75 but also a data file containing the same information.
- the data file is read into the Authentication Center (AuC) of the HLR 26 for service provisioning and into the wireless network provider's operation sub-system OSS 80 for billing and tracking.
- AuC Authentication Center
- SIM's 73, 74 and VSIM's 76 are created in a similar way.
- the SIM or VSIM provider generates a data file of SIM or VSIM information that is read into the AuC of HLR 26 and into the mobile network operator's OSS 80.
- SIM PROM's 76 are created from the data file and installed in the access node 48. Alternatively, the software in access node 48 is updated to provide the VSIM's.
- the access node 48 assigns two SIM's/VSIM's to each line 51 - 55. For each SIM/VSIM 73, 74, 76 an IMSI and the GSM secret key, the Ki, is generated.
- FIG. 12 A schematic representation of a fourth embodiment of the present invention is shown in Fig. 12.
- the access node means 48 in accordance with the present invention is represented by responder 77, whereby some functions are carried out by the WBTS 250.
- the functions of the access node 48 in accordance with the present invention are therefore shared between WBTS 250 and the responder 77.
- the ABS 40 is represented by the wired BTS 250 in accordance with this embodiment.
- WBTS 250 is similar to the WBTS 150 of the third embodiment and is responsible for converting all messages to and from the format of the secondary network 30, e.g. ISDN.
- WBTS 250 has the same communication processing capability as the WBTS 150 of the third embodiment.
- WBTS 250 does not include a store for the SII.
- WBTS 250 of the fourth embodiment does not contain the SII's 73, 74 of the WBTS 150 of the third embodiment, instead the subscriber identity information SII 73, 74 is stored in a responder 77.
- the term "responder” in this application refers to an electronic device which provides a specific response to a query, e.g. returns SRES when interrogated with a RAND.
- the responder 77 therefore bears some superficial similarity to so-called “dongles” which are hardware devices for copy protection of software. It will be understood that the use of the word "responder" in the present application relates only to the specific devices disclosed in this application and does not relate to commercially available copy protection devices.
- Responder 77 may include two SIM-ICC's with associated readers and may be located on the ISDN S/T bus in the subscriber premises. Vocoding and DTAP termination are in the WBTS 250 as for the third embodiment. The responder 77 does not provide protocol interworking, this is carried out in the WBTS 250. The WBTS 250 is able to access either SII 73, 74 in the responder 77 for authentication requests.
- the responder 77 may be a small (8x4x2cm) unit that connects to the S/T bus of an NT1 49 via a port 87.
- the responder 77 takes-up one of the 8 allowed terminals on the S/T bus.
- Responder 77 stores two subscriber identity informations SII 73, 74 in a secure access Subscriber Information storing Means (SISM) 81 which includes a suitably secure non-volatile memory 85.
- SISM 81 includes an authentication processor 82 for generating the SRES from the RAND.
- Responder 77 includes a communication processor 83 for carrying out the ISDN layer 1&2 logic to connect to the S/T bus.
- Responder 77 preferably has a memory 84 dedicated to the communication processor 83.
- a suitable voltage Vdd is provided by the S/T bus for driving the memories 84, 85 and the processors 82, 83.
- the responder 77 responds only to a single fixed Terminal Equipment Identifier (TEI) on the ISDN D-channel.
- TEI Terminal Equipment Identifier
- the responder 77 is transparent to messages on ISDN B-Channels. Other terminals on the bus are unaffected by D-channel messaging to and from responder 77 since they ignore messages not sent to their own TEI.
- Responder 77 may be implemented as an application specific integrated circuit, e.g. a single chip processor, and does not need to be programmable.
- the WBTS 250 converts any message from MSC 28 into the format expected by the authentication processor 82 of the responder 77. These messages are sent to the responder 77 via the ISDN D-Channel.
- the communication processor 83 of responder 77 removes any data in the message relating to the ISDN format and presents the message (e.g. RAND) to the authentication processor 82. Any response from the authentication processor 82 is then converted into ISDN D-channel format by communication processor 83 and returned to the WBTS 250.
- ISDN layer 3 messaging is between the MSC 28 and the SISM 81, with the processor 83 of responder 77 providing only layer 1 and 2.
- the WBTS 250 and the responder 77 can respond to the following types of queries:
- FIG. 14 A possible message sequence in accordance with the fourth embodiment is shown schematically in Fig. 14.
- the WBTS 250 interrogates the responder 77 requesting the responder 77 to provide the IMSI of the subscriber using the ISDN D-channel.
- the communications processor 83 of the responder 77 transmits the request to the authentication processor 82 which retrieves the IMSI from the memory 85.
- the IMSI is sent in clear to the WBTS 250.
- WBTS 250 generates a LUR using the IMSI obtained from the responder 77 and sends the LUR to the MSC 28.
- the MSC 28 may respond immediately to the WBTS 250 or may interrogate the HLR 26.
- the MSC 28 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto.
- the answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message.
- MSC 28 may request authentication from the WBT5 250. It is preferred if authentication is of the active type with an exchange between the WBTS 250 and the MSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this the MSC 28 sends an Authorisation Request via the WBTS 250 containing the randomly generated number RAND which is to be processed by the responder 77. The WBTS 50 transmits the request on the ISDN D-channel to the responder 77. The communications processor 83 in responder 77 relays the RAND to the authentication processor 82 after removing any data relevant only to D-channel signaling. The authentication processor 82 applies the relevant algorithm on the RAND, e.g.
- the responder 77 sends the SRES to the MSC 28 via the WBTS 250.
- the MSC 28 compares the SRES from the WBTS 250 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and the same Ki for the subscriber involved. If both agree, the SII 73 or 74 of responder 77 is now registered in wireless network 20 as if it belonged to a mobile station.
- the routing information to the respective MSC 28 is stored in the HLR 26. Any call to one of the terminal devices 56, 57 is routed by the HLR 26 to the MSC 28, and via the BSC 38 to the WBTS 250.
- the WBTS 250 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented.
- the 16kB/s coded messages are decoded in WBTS 250 to 64kB/s A- or ⁇ -law signals. For both 16kB/s or 64kB/s messages, control signals are converted to ISDN format and the call is transferred to the relevant terminal device 56, 57.
- MSC 28 sends a Setup Request to WBTS 250.
- This request is also part of the RIL3-CC protocol of GSM.
- This request is received by WBTS 250 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of the ISDN terminal devices 56, 57.
- These Q931 messages are transparent to the responder 77 as they are not addressed to the TEI of the responder 77.
- the relevant device 56, 57 responds with a Call Proceeding message.
- the WBTS 250 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol.
- the call setup is now complete and the call may continue.
- WBTS 250 operates in this embodiment as a protocol interworking device.
- the WBTS 250 In the event of a failure involving the responder 77 the WBTS 250 would not be able to associate the respective terminal device 56, 57 to a subscriber's service. However it would still possible for the WBTS 250 to allow certain calls to be originated from that terminal device. Emergency calls could be recognized and routed using GSM emergency call protocols. All other originations could be routed to a service center (not shown). The service center phone number and a service IMSI to use for the call would be defined as WBTS 250 attributes at the OMCR.
- the GSM system specifies a SIM-MS interface that allows value-added service information to be stored within the SIM-ICC. Examples are speed dial numbers, customized Short Message Service (SMS) text strings. If value-added services are supported, the software of WBTS 250 supports these.
- the access node 40 may communicate with terminals 45 to 47 at customers premises via a secondary network 30 in accordance with the present invention.
- the secondary network may be a Public Switched Telephone Network (PSTN).
- PSTN Public Switched Telephone Network
- the present invention includes a method of providing fixed terminal access to a mobile telephone network, subscriber's mobile stations in the mobile telephone network being addressable by subscriber information references, the method comprising the steps of providing a fixed access node (FAC) 350 between the mobile telephone network 20 and a wireline PSTN 30 whereby the FAC is part of the mobile network 20 as well as providing a second interface unit 120 between the PSTN 30 and a fixed terminal of a subscriber of the mobile telephone network, the fixed terminal being associated with a subscriber information reference in the mobile telephone network 20 and routing calls from the subscriber's fixed terminal destined for the mobile telephone network 20 and routing calls to the subscriber's fixed terminal from the mobile telephone network 20 through the FAC 350 and the second interface unit 120 and the PSTN 30.
- FAC fixed access node
- a wireline PSTN 30 will not support all the functions of a mobile telecommunications system required for mobile network services, e.g. authorization, location updating, point-to-point short message service (SMS), point-to-multipont cell broadcast message service, i.e. it will not have in its set of communication commands those required for these services. Hence, there cannot be a straight mapping from one system to the other.
- such services may be provided for the subscriber's wireline terminals 57, 58.
- the provision of mobile telephone services across the PSTN 30 will be described with particular reference to the SMS but the present invention is not limited thereto.
- Fig. 15 shows a schematic representation of a further embodiment of the present invention.
- the subscriber terminals 56 to 58 may be a normal fixed access terminal 56 or may be enhanced fixed access terminals 57, 58 capable of supporting an enhanced set of services of the mobile telephone network 20. This enhanced set of services is a superset of the services supported by the terminal 56.
- terminal 56 is not able to handle SMS messages directly but must carry out a special procedure to retrieve the SMS message.
- Each such terminal 56-58 has a subscriber information reference in the mobile telephone network 20 (and not a directory number in the PSTN).
- the MSC 28 is part of the mobile telephone network 20 and the fixed access subscriber terminals (FASTMN) 56-58 for the mobile telephone network 20 can communicate with the MSC 28 but are not connected directly thereto and can only communicate with the MSC 28 via a PSTN 30.
- FAC 350 of the mobile telephone network 20 in combination with one or more bridges 120 support the mobile network services such as voice or data transmission as well as the specialized services such as SMS, location updating, authentication to and from the terminals 56 to 58 through the PSTN 30 to the mobile telephone network 20.
- Fig. 15 only one bridge 120 is shown but it will be understood that several bridges 120 may be able to communicate with one or more MSC's 128 via a FAC 350.
- the PSTN 30 may provide an ISDN in accordance with standards such as the CCITT Series 1 standards. It is preferred if the PSTN 30 supports common channel signing as described for instance in the book "ISDN and Broadband ISDN with Frame Relay and ATM" by William Stallings, Prentice-Hall International Inc. 1995. By using common channel signaling it is possible to deliver information messages via signaling paths without involving bearer channels and it even possible to deliver data messages when all the bearer channels are busy.
- An ISDN may be include a basic rate connection to the terminals 57, 58 at 144 kb/s with one 16 kb/s "D" channel and two 64 kb/s "B” channels or a primary rate connection at 1544 kb/s (North America and Japan) with one 64 kb/s "D” channel and 23 “B” channels or 2048 kb/s (Europe and elsewhere) with one 64 kb/s "D” channel and 30 "B” channels.
- BTI basic rate connection
- an a signaling message may be transferred to a customer premises from the mobile network 20.
- the end-to-end signaling of the ISDN user part such as the user-to-user signaling methods referred to here as UUS1 to UUS3 as defined by ETSI standard Q.931.
- UUS1 the user-to-user signaling methods referred to here as UUS1 to UUS3 as defined by ETSI standard Q.931.
- UUS1 A first possibility is that the message exchange is limited to a single 140 byte message appended to a SETUP message. This has the disadvantage that certain messages from the mobile network 20, e.g. an SMS message, may be 160 bytes long, i.e. the procedure would have to be performed twice. This alternative has the advantage that the messages can be transmitted even if all bearer channels are busy.
- the signaling message may be sent in messages before a call has been set up. For instance, the first part of an signaling message may be contained in the SETUP message. The terminal replies with an ALERTING message. After this exchange there may be further exchange of messages until one of the sender and receiver issues a RELEASE message. This procedure does not set up a call completely and there is therefore no charge. Further, the message may be transmitted even when the bearer channels are busy.
- UUS3 Thirdly, the signaling message may be transmitted during a normal call. This requires an active call merely to send a signaling message which is a wasteful and expensive method unless there is regular traffic to the terminals 56-58.
- a further danger is that if there are several terminals 56-58 on one bus at the customer premises, it may be impossible to prevent another terminal picking up on a call. Hence, there is no guarantee that a particular message arrives at the intended recipient.
- the terminals 56-58 in accordance with the present invention are adapted to include messages in accordance with UUS1 to UUS3 above and to receive these messages. It is anticipated that these terminals 56-58 are not stimulus devices but rather include sufficient processing and memory capacity to interpret the received messages and to construct messages from standard commands and data input into the terminals, e.g. from a keyboard. For instance the terminals 56-58 may be personal computers running dedicated communication software.
- Dch packets D channel X 25 packets
- Yet another option where a separate signaling channel is not available is to embed the signaling between the FAC 350 and the FAC bridge 120 within a bearer channel of the wireline network 30. This requires a device at the customer's premises able to demodulate in-band signaling without affecting other voice or data traffic which may result in an unacceptable increase in the cost of subscriber equipment. This option would also require an active bearer circuit for transporting any message even those unrelated to a call which may increase costs compared to the methods described above.
- Normal mobile telephone traffic e.g. voice or data
- the FASTMN 56-58 are provided with Subscriber Information references within the mobile network 20 as for a normal mobile station within the mobile network 20.
- a call to one of the FASTMN 56-58 is therefore made using this subscriber information as if the call were being placed to a mobile telephone.
- the call will be directed to MSC 28 by conventional routing means within the mobile network 20.
- the HLR 26 (Fig. 1) stores the relationship between the Subscriber Information of the relevant FASTMN 56-58 and its associated MSC 28.
- FAC 350 which may be configured as shown in Fig. 16 which is similar to the node described with reference to Fig. 9 but with additional processing functionality as described below to provide a digital interface to the PSTN 30.
- Both the bridge 120 and the FAC 350 may have directory numbers (DN) within the PSTN 30 and these DN's may be used by the bridge and FAC 120, 350 to set up calls between themselves for communication purposes. Otherwise these numbers are hidden from any user.
- DN directory numbers
- FAC 350 includes communication connections 101, 102 for transmitting signaling and user messages, respectively, to and from the wireless network 20 via ports of switching means 93. These connections are normally made with an MSC 28 as described above.
- the signaling and message connections 101, 102 may be, for example, different channels of a TDMA communications system between the MSC 28 and the FAC 350.
- Communications connections 101, 102 may be any suitable form of connection, e.g. a wireline or wirelines or a microwave link.
- FAC 350 also includes signaling and user message communications connections 107, 108, respectively, for transmission to and from the secondary network 30, e.g. to the customer premises and to terminal devices such as telephones 56-58 via the ports of switching means 93 and for example by a trunking protocol such as ETSI ISUP or other SS7 protocols, ETSI Primary Rate Interface protocol or a similar trunking protocol.
- a trunking protocol such as ETSI ISUP or other SS7 protocols, ETSI Primary Rate Interface protocol or a similar trunking protocol.
- the blocks in Fig. 16 represent certain functions of the FAC 350. They do not necessarily represent individual hardware elements of the node 350.
- the functions to be described with respect to node 350 may be implemented in a variety of ways, e.g. by conventional processors running associated software specifically adapted to perform the functions in accordance with the present invention, and memory devices, e.g. disc drives, as well as other communications peripheral equipment, e.g. suitable ports and digital switches.
- the FAC 350 may be controlled by a node controller 91 which may be a processor which carries out common functions necessary to control FAC 350.
- the node controller 91 controls and co-ordinates the functions of the voice processor 96, if such is required, the operations and maintenance unit 97, the signaling interworking unit 92 as well as the switching means 93.
- the operations and maintenance unit 97 will not be described in detail.
- the present invention includes transmitting messages from the mobile network 20 to the terminals 56-58 in compressed or vocoded form.
- the present invention also includes a voice processor 96 which may include a transcoder and rate adapter to code and decode between compressed voice data from the wireless network 20 and uncompressed voice data transmitted to and from the end terminals 56-58.
- the signaling interworking unit 92 terminates the signaling messages (represented by block 94) in the format of the wireless network 20 as well as terminating the signaling messages (represented by block 95) in the format of the relevant trunking protocol from the PSTN 30.
- Signal interworking unit 92 may convert signal formats between the wireless network 20 and the trunking protocol. For example, signaling interworking unit 92 may provide X 25 packet handling and conversion.
- Switching means 93 provides connections to and from the ports of the FAC 350 as well as routing signals to the appropriate processors within FAC 350. As will be explained later, switching means 93 may include a multiplexer.
- FAC 350 also includes a memory 105.
- Memory 105 may be used for the subscriber identity information (SII) of terminals 57, 58 when this information is not stored in the terminals themselves.
- SII subscriber identity information
- a part of the memory 105 in this case may include being in the form of an addressable read only non-volatile memory, e.g. a detachable block of programmable read-only memory, which has been pre-programmed with each subscriber identity information such as the IMSI and the private key K i .
- the encryption algorithms may be stored in the same memory 105 and may be executed by the node controller 91 or by a separate dedicated authentication processor (not shown).
- the memory 105 may also be conventional addressable non-volatile memory storage, i.e. e.g.
- the memory may include a plurality of SIM-ICC's, each slotted into a respective card reader (not shown).
- the SII of terminals 56-58 may be alternatively located at the bridge 120 in the form of SIM cards or as virtual SIM's stored in memory, i.e. VSIM's, or in the terminals 57, 58 themselves as SIM cards or VSIM's.
- Memory 105 includes a structure which stores the correspondence between the SII of terminals 57, 58 and the DN of the bridge 120 in the PSTN 30.
- a message including signaling and a user message in the format of the wireless network 20 e.g. GSM
- the signaling and user message are respectively directed to the relevant processing means 92, 94, 95, 96.
- Signals from the wireless network 20 are terminated at 94 and the signals converted into the appropriate format for the PSTN 30 and in particular the relevant trunking protocol in the signaling interworking unit 92 as well as any rate adaption necessary between the wireless network 20 and the PSTN 30.
- Node controller 91 includes a call routing function. From the SII of the called party the node controller 91 interrogates the memory 105 and obtains the DN of the appropriate bridge 120 associated therewith. Node controller 91 then sets up a call with bridge 120 via PSTN 30. The call may be set up using a one stage or two stage addressing procedure. For the two stage procedure, when the call is answered by bridge 120, the transported signaling information as well as the voice and/or data messages from the voice processing unit 96 are then transmitted to the bridge 120 via the PSTN 30. Processor 96 and signal interworking function 92 are provided with any necessary communications drivers for communication with the PSTN 30 using the relevant trunking protocol.
- the bridge 120 may be connected to an S/T bus from an ISDN NT1 129 at the subscribers' premises.
- the NT1 129 acts as a digital interface between the circuits of the PSTN 30 and the S/T bus 122.
- the present invention is not limited to the use of an ISDN NT1 interface for connection to the local loop of the PSTN 30 and the bridge 120 may be directly connected to the local loop, i.e. it may also include a digital interface which carries out the same functions as an NT1 interface.
- the NT1 129 or the directly connected bridge 120 is adapted to convert incoming messages from the PSTN to a S/T bus format and outgoing messages from the S/T bus format to an appropriate PSTN format.
- Each PSTN circuit connected to the NT1 preferably includes one or more bearer or B-channels and one signaling or D-channel as is well known for an ISDN basic rate interface (BRI).
- the traffic channels of the PSTN 30, i.e. B-channels may pass transparently through the bridge 120 to the terminals 56 - 58. For instance, this would normally happen when the bridge 120 is handling voice telephone calls to and from the PSTN 30.
- the D channel signaling from the PSTN 30 is preferably separately terminated at the bridge 120.
- One D channel termination 125 is used for PSTN messaging and the other 126 to drive the local bus 122 with the terminals 56 to 58.
- the bridge 120 would include a processor and memory 124 for receiving and storing any signaling commands associated with the packets as well as the packets themselves.
- a display 127 may be provided for displaying when a message has arrived and the bridge 120 may additionally activate audible signals at the appropriate terminal 56, 57.
- a call may include compressed voice data as typically required for the air interface of a mobile telephone network or may be A-law or ⁇ -law coded or similar as is known for normal transmission of telephone calls in a PSTN.
- the FAC 350 sets up a call with the bridge 120 through the NT1 106, 129 by dialing the DN of the bridge 120.
- the FAC 350 When bridge 120 answers the call, the FAC 350 generates a DTAP "answer" message back to the MSC 28 and connects the bearer channel the mobile telephone network 20 to the bridge 120.
- this signaling data from the mobile telephone network 20 may mapped to the D-channel of the ISDN PSTN 30 by the signaling interworking function 92, and the traffic message is mapped by the voice processor 96 to a "B" channel or part of a multiplexed "B” channel if it is for instance a compressed voice message.
- Bridge 120 receives the B-channel and D-channel messages as placed on the S/T bus by the interface NT1 129.
- the FASTMN 57, 58 are configured to receive the B-channel messages without alteration these are passed to them through the bridge 120 transparently.
- the B-channel messages may be compressed (e.g. vocoded) to increase capacity in which case the processor 124 of the bridge 120 converts these into the appropriate form, e.g. A- or ⁇ -law.
- bridge 120 sets up a call with the FAC 350 by dialing the DN of the FAC 350 in the PSTN 30.
- a one-stage or two-stage addressing technique may be used to complete the call with mobile network 20.
- the bridge 120 may simply initiate a callback call with FAC 350 so that all calls within the PSTN 20 always appear to originate at FAC 350.
- bridge 120 may include within the control logic unit 124, call routing functions to be able to place a call to the DN of the FAC 350 through the NT1 129 and the PSTN 30.
- the control logic unit 124 in combination with the Dch termination unit 125 provides X25 packet handling and generation in the bridge 120.
- the procedure for seting up a call may be as follows when the terminal 57, 58 includes a SIM card. The caller attempts to place a call from one of the terminals 57, 58.
- the bridge 120 sets up a call with the FAC 350 and transfers not only the called number but also its own DN and the subscriber identity information from the SIM (one-stage addressing).
- the node controller 91 interrogates the memory 105 to see if the SII is stored there.
- the FAC forwards the call to the MSC 28 in a format as if it were a call from a conventional mobile station. If there is no record, the FAC 350 initiates a local updating procedure and the MSC 28 decides whether an authentication of the SIM associated with the fixed terminal is necessary. Signaling between the mobile network 20 and the SIM is carried out within the existing call between the bridge 120 and the FAC 350 using in-call information transfer. Once the SIM is authenticated a location updating is performed and the SIM is now registered at the HLR 26 as being associated with the MSC 28 and the memory 105 of the FAC 350 is updated with the new association between the SIM and the DN of the bridge 120. From this point on the owner of the SIM will be billed for all calls from the respective terminal 57, 58.
- the mismatch between the format of the messages from the mobile network 20 and the PSTN 30 depends on the services supported by both networks.
- the SMS is a specialized GSM feature that guarantees delivery of short text messages between a mobile station and another terminal capable of receiving SMS messages.
- the SMS is organized by a Short Message Service Center (SMSC) 110.
- SMSC 110 queries the HLR 26 to determine the last known location of the mobile and then directs the message to the appropriate MSC 28. This MSC 28 attempts to deliver the message and reports success or failure back to the SMSC 110.
- the message is stored at the SMSC and a pointer is stored in the mobile system, e.g. in the HLR 26, indicating that a message is waiting.
- the HLR 26 informs the SMSC 110 that the mobile is now back in the system.
- the SMSC 110 initiates a further delivery attempt. If successful, the short message is stored in the mobile station, e.g. in the SIM, and a message is displayed on the LCD screen of the mobile station indicating that a message has arrived.
- the SIM of a subscriber having a terminal such as 57, 58 is not necessarily located at the subscriber's premises nor in a subscriber's terminal so that some additional facility must be provided to offer this service in an integrated network. Additional problems may occur if the SIM is located at the customer's premises. If the mobile network requests authentication or a location update, it is possible that the FAC 350 cannot obtain a connection through to one of the FASTMN 57, 58 due to congestion on the PSTN. In this case the authentication or location update fails. To avoid this problem it is preferred in accordance with this embodiment if the SIM is located at the FAC 350, e.g. in the form of a VSIM or virtual SIM as described above.
- the FAC 350 stores a record which associates each terminal 56-58 not only with the relevant DN of the bridge 120 but also where the SIM is stored, i.e. in the FAC 350, the relevant bridge 120, in a responder or converter on the S/T bus of the relevant fixed terminal or in the terminal itself. This is necessary so that the relevant query may be initiated to the correct place in order to interrogate the SIM.
- the user-user communication methods UUS1 and UUS2 described above are preferred for all specialized communications such as authentication or location updating if these services are supported by the PSTN because these methods do not require a FAC to FAC bridge bearer channel.
- One preferred method when the SIM is placed in a converter 70 or a responder 72 (both described above) on the S/T bus 122 or in a FASTMN 57, 58 is as follows when the services UUS2 or UUS3 described above are not available and a call must be set up.
- FAC 350 On receiving no reply from the bridge 120, FAC 350 marks the relevant SIM as disconnected and uses the PSTN supplementary service "Call Completion Busy Subscriber" (CCBS) to notify it when a line to the relevant terminal 57, 58 is free again. Once free the call is connected and the relevant procedure carried out.
- CCBS Call Completion Busy Subscriber
- SMS message An example will now be provided of transmission of an SMS message but the present invention is not limited only to this service.
- the PSTN 30 supports ISDN services
- the mobile network protocols such as DTAP which include SMS messages may be transmitted during a normal call using the UUS3 service described above.
- This requires an active call merely to send a message of about 160 bytes which is a wasteful and expensive method.
- a further danger is that if there are several terminals on one bus at the customer premises, it may be impossible to prevent another terminal picking up on a call - hence there is no guarantee that a message arrives at the intended recipient.
- the SMS may be sent in messages before a call has been set up using the UUS2 service mentioned above.
- the first part of a SMS message may be contained in the SETUP message.
- the terminal replies with an ALERTING message.
- a third possibility is that the message exchange is limited to a single 140 byte message appended to a SETUP message as part of the UUS1 service mentioned above. As an SMS message may be 160 bytes long, the procedure would have to be performed twice.
- the SMS message could be sent using the X25 Dch packet service mentioned above.
- the SMS message may be sent along a B-channel if one is available.
- One preferred embodiment of the present invention is to transmit compressed voice messages from the MSC 28 to the FAC 350. By multiplexing messages on the fixed lines between these two nodes of the mobile network 20 the costs of transmission can be reduced. These compressed messages are transmitted through the PSTN 30 multiplexed into one B-channel of a BRI using for instance the protocol I465/V.120. Four 16kb/s compressed voice communications may be multiplexed into one B-channel of a BRI. Three other 16 kb/s compressed voice communications may be multiplexed and transmitted on the other B-channel of the BRI.
- the remaining 16kb/s sub-channel on the second B-channel may be used for transmission of signaling from and to the mobile network 20 which cannot be mapped onto the D-channel simply, e.g. a short message of 160 bytes.
- This embodiment of the present invention requires a multiplexer in the switching means 93 of FAC 350 and in the Dch termination unit 125 of the bridge 120. Obviously a first active call must be set up on the relevant B-channel for one of the subscriber's terminals which depends from the relevant FAC bridge 120 for the SM to be transmitted but there is no need for this call to be from or to the intended recipient of the short message at the subscriber's premises.
- a special circuit element which has one or more of the capabilities mentioned above, e.g. X.25 protocol and receipt of SMS messages on the D-channel during SETUP or on a D-channel or a B-channel during an active call.
- the customer premises has a bridge 120 which controls all calls receivable by the terminals 56 to 58 and transmits these calls to the terminals on its own bus 122.
- the bridge 120 preferably includes sufficient intelligence, i.e. processors and memory, to carry out at least one of the methods described above: UUS1 to UUS3, Dch packets or B-channel multiplexing, for delivering SMS messages.
- the bridge 120 is connected to the S/T bus from an NT1 however, the present invention is not limited thereto and the bridge 120 may be directly connected to the local loop.
- the logical connections between the FAC 350 and the bridge 120 are shown schematically in Fig. 18.
- the ISDN layers 1, 2, 3 are shown as L1, L2, and L3.
- the bridge protocol layer does two things: 1) it carries application data to the subscriber terminals, and 2) it transports commands and information between the FAC 350 and the bridge 120.
- Bridge 120 is preferably capable of receiving both point-to-point and point-to-multipoint protocols so that it can process SMS and cell broadcast messages from the mobile telephone network 20.
- the Subscriber Information Module may be located at different positions in accordance with the present embodiment and the position has an effect on the operation and capabilities of the FAC 350 and/or the bridge 120.
- a call is in progress via the bridge 120 and the FAC 350.
- a second call for the same subscriber arrives at the FAC 350.
- the FAC 350 sends information about the second caller to the bridge 120 which is forwarded to the subscriber terminal on its display.
- the subscriber can then decide to put the first call on hold and activate the second call or activate a 3-way call.
- These call commands are transmitted transparently through the PSTN 30.
- the service is run and controlled strictly by the mobile network 20 and the terminating terminal 56-58.
- the PSTN 30 is unaware that the service is taking place.
- Fig. 19 shows the signaling termination locations for one preferred embodiment of the present invention as applied to a GSM mobile telephone system communicating with a fixed terminal 56 via a PSTN.
- the terminal type may be a standard ETSI BRI terminal which supports a minimum of services and does not support a SIM card. More advanced terminals such as 57, 58 may support SIM cards and different signaling termination locations.
- Signaling between an MSC and a base station controller (BSC) in the GSM system which terminates on either of these is transmitted using the BSSMAP protocol.
- BSC base station controller
- the FAC 350 terminates and answers these signals as if it were a BSC. Any signaling for mobility management or for call control using the DTAP protocol (i.e.
- the MSC 28 and the FAC 350 will be terminated on the MSC 28 and the FAC 350, respectively, as shown in Fig. 19.
- Queries with respect to Subscriber Information will terminate at different locations depending on where the Subscriber Information is stored, e.g. in the FAC 350 or the bridge 120 for a terminal type 56.
- the SIM card is stored at the FAC bridge 120 and location updating is performed by a query from the FAC to the FAC bridge.
- the SIM card may be located in the terminal and the option of a FAC bridge query is shown in Fig. 19, i.e.
- SMS messages will be transferred across the PSTN 30 by one of the methods described above and will be stored locally in the bridge 120 operating as a sort of "e-mail" or "voice-mail” box. Transmission of the message between the FAC bridge 120 and the terminal 56 requires a special procedure to be initiated by the terminal 56 to interrogate the bridge 120.
Abstract
Description
- The present invention may relate to the integration of two networks, e.g. a fixed and mobile telecommunications system and in particular to an access node and a responder for use in such an integrated system as well as methods of operating the integrated system, the responder and the access node. Further, the present invention may relate to a method and a system for providing fixed access terminals for a mobile telephone network. The present invention may also relate to a system and a method of providing fixed access to a mobile telecommunications network via an intermediate network such as a PSTN as well as to interfaces for routing communications through the intermediate network.
- The article "Cordless telephones and cellular radio: synergies of DECT and GSM" by W. H. W. Tuttlebee in Electronics and Communications Engineering Journal, October 1996, pages 213 to 223 discusses the interest among fixed or wireline telecommunications operators to provide some telecommunication services by radio links and the interest among mobile telephone service operators to provide a complete range of services in order to compete with the traditional fixed telecommunication systems. The present invention relates to the integration of fixed and mobile telecommunication services. Conventionally this integration is limited to the provision of single-number routing regardless of location, i.e. to provide mobility of the subscriber anywhere within a geographical area and independent of the transmission system of messages to the subscriber. Such schemes involve the co-operation of one or more of fixed, cellular radio or cordless telephone networks.
- Despite this interest in integration of the various systems two basic philosophies still exist as to how a telecommunications network is to be organized. The older of these two systems switches calls through to a particular location. This type of system is well known as the "Plain Old Telephone System ("POTS"). In an implementation of land lines the service is generally tied to the access method. Service provisioning, customer service and problem resolution are tailored to the idea that access and service are tied together. The physical management of the large number of subscriber loops served by the network depends upon this mapping. Subscribers are provided with a directory number for a location in the system, i.e. to a connection point and not for a particular receiving device. Modifications to such conventional systems are known, e.g. fixed radio access known from the article by R. Dettmer, in the IEE Review from July, 1995, pages 145 to 148. Such radio access is merely the substitution of one leg of the transmission path of a single telecommunications network with a radio link but is not the integration of two networks.
- On the other hand, the more modern mobile telephone telecommunication systems allow call routing to a particular device independent of its location provided it is within the radio coverage area of the system. To be able to locate a receiving device, an electronic means for identifying the device and thereby indirectly the subscriber, is provided in the receiving device. This identification may be in the form of information stored in a memory which is part of the mobile receiving device itself or it may be in a separate insertable memory module, for instance a Subscriber Identity Module (SIM) in an integrated chip card as is known from the European GSM mobile telecommunication system. The radio telecommunication system protocols are used to identify a user from the SIM's encoded information, and the services to which the user has subscribed can be derived from the same stored information.
- The issue of mobility is traditionally considered to be of very great importance. For instance two major research projects, the Future Public Land Mobile Telecommunication System (FPLMTS) of the CCIR Committee TG 8/1 and the Universal Mobile Telecommunications System (UMTS), which is part of the European RACE program, have the common goals of providing international roaming by mobile users, of providing service quality equivalent to fixed-line telecommunication systems and of providing some ISDN services.
- Certain types of data transmission, e.g. fax, may pose technical problems with mobile phones. Modern generated tones have gaps and strong phase changes due to rapid multipath fading. This results in data being garbled or lost. Further, handoffs between cells of the mobile telecommunications system are an even stronger cause of data loss. This problem cannot be completely solved by using a stationary receiving device. In large cities such as Paris, France, handoffs can be expected within the normal duration of a fax message even if the faxing device is stationary. These handoffs are forced because of changes in the signal intensity caused by such variables as moving traffic, swinging cranes on building sites and the need to readjust the boundaries of cells in order to cope with load changes and the limitations of the frequency spectrum available. Further, the bandwidth of a mobile telephone system is usually very limited whereas wireline connections may carry 100 kb/s or higher. Hence, for some types of traffic a mobile phone subscriber may prefer an alternative type of connection.
- A subscriber may wish to have all e-mail messages or faxes sent and received by a device which is not subjected to handovers and/or has a higher transmission rate. This could be achieved by automatically directing a call to a fixed telephone in a conventional (POTS) wireline telephone system. This approach has the disadvantage that the subscriber must subscribe to both the wireline and the wireless system. The subscriber may wish to make use of reductions in charges resulting from using one system for all services, rather than have to subscribe to two systems. One possible way of solving this problem would be for the radio telecommunications system provider to put in a wireline system as well as the radio telecommunications system and thus be able to offer both types of service, i.e. mobile telephones and fixed transceivers such as fax machines. This has the disadvantage that the provider must install and maintain two differing sets of equipment.
- To achieve an integration of a wireless and a wireline system it is preferred if:
- a. the subscriber loops (belonging to the wireline system) can be tracked to the subscribers service for problem resolution, routine maintenance, and any possible regulatory requirements;
- b. the subscriber's SIM information is available to the wireless network transparently, as anything less would require changes to the wireless network traffic model.
-
- The present invention relates to a first method of providing fixed terminal access to a mobile telecommunication network, subscriber's mobile stations in the mobile telecommunications network being addressable by subscriber information references, the method comprising the steps of: providing a first interface unit between the mobile telecommunications network and a wireline network; providing a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable with a subscriber information reference of the mobile telecommunications network and being connected to a local loop of the wireline network; and providing services of the mobile telecommunication network to and from the subscriber's fixed terminal through the first interface and the wireline network. The first interface unit may be a access node of the mobile telecommunications network in trunked communication with the wireline. The first interface unit may be connected between a mobile switching center of the mobile telecommunications network and the wireline network. The provision of services may include routing calls from the subscriber's fixed terminal destined for the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first interface unit and the wireline network. The first method may include provision of a second interface unit between the wireline network and the fixed terminal of a subscriber of the mobile telecommunications network and providing mobile telecommunication network services through the first and second interfaces and the wireline network. The first method also includes routing calls from the subscriber's fixed terminal destined for the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first and second interface units and the wireline network. In the first method at least portions of messages from the mobile telecommunications network are encapsulated by the first interface unit so that they are transmitted transparently through the wireline network. Also, at least portions of the messages from the fixed subscriber terminal are encapsulated by the second interface unit so that they are transmitted transparently through the wireline network. In the first method the wireline network may be a PSTN and the first and second interface units are each provided a directory number within the PSTN. Each wireline of the PSTN may include one or more bearer channels and a data channel and data channel messages from the PSTN are terminated at the second interface unit. The second interface unit may be connected to an S/T bus and the second interface unit preferably converts incoming messages from the PSTN to S/T bus format and converts outgoing messages from the S/T bus format to a PSTN format. The second interface unit preferably assigns data and bearer messages from the PSTN to appropriate channels on the S/T bus.
- The present invention may also relate to a first system for providing fixed terminal access to a mobile telecommunications network, comprising: a first interface unit between the mobile telecommunications network and a wireline network; a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable by a subscriber information of the mobile telephone network and being connected to the local loop of the wireline network; and the first interface unit having means for transmitting any message associated with the subscriber's fixed terminal through the first interface unit and the wireline network. The first interface unit may be an access node of the mobile telecommunications network in trunked communication with the wireline. The first interface unit may be connected between a mobile switching center of the mobile telecommunications network and the wireline network. The first interface unit may adapted to encapsulate at least a portion of a message from the mobile telecommunications network so that it is transmittable transparently through the wireline network. A second interface unit may be provided between the wireline network and the fixed terminal of a subscriber. The first system may include means for routing calls from the subscriber's fixed terminal destined to the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first and second interface units and the wireline network. The second interface unit may be adapted to encapsulate at least a portion of a message from the fixed subscriber terminal so that it is transmittable transparently through the wireline network. The wireline network may be a PSTN and the first and second interface units are each provided with a directory number within the PSTN. Each wireline of the PSTN may include one or more bearer channels and a data channel and the second interface unit includes a terminator for the data channel messages from the PSTN. The second interface unit may be connected to an S/T bus and the second interface unit may then be adapted to convert incoming messages from the PSTN to S/T bus format and outgoing messages from the S/T bus format to an appropriate PSTN format. The second interface unit may be adapted to assign data and bearer messages from the PSTN to appropriate channels on the S/T bus.
- The present invention may also include a first interface unit for connection between a fixed terminal at a subscriber's premises and a wireline network, the interface unit comprising: a processor for processing messages between a mobile telephone network and the fixed terminal via the wireline network, the processor being adapted to encapsulate at least a portion of an outgoing message in the mobile telephone network format from the fixed terminal in an appropriate wireline format so that the outgoing message from the fixed terminal is transmittable transparently through the wireline network to the mobile telephone network. Each wireline of the wireline network may include one or more bearer channels and a data channel, the interface unit further comprises a terminator for terminating wireline data channel messages. The wireline network may be a PSTN. The first interface unit may include means for routing calls through the PSTN.
- The present invention may include a second interface unit for connection between a wireline network and a mobile telephone network, the interface unit comprising: a processor for processing messages to be transmitted between a mobile telephone network and a fixed terminal at a subscriber's premises via the wireline network, the processor being adapted to convert incoming messages in a wireline network format to a mobile telephone network format and to encapsulate at least a portion of an outgoing message having the mobile telephone network format in an appropriate wireline network format so that the outgoing message from the mobile telephone network is transmittable transparently through the wireline network to the fixed terminal at the subscriber's premises. The wireline network may be a PSTN. The second interface unit may include means for routing calls through the PSTN
- The present invention also includes a second telecommunications system comprising: a first radio telecommunications network having at least one radio coverage and a switching controller for generating and transmitting control signals of a first format; and a second telecommunications network including at least one subscriber terminal; the system further comprising: means for storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points, the storing means is adapted to provide the first radio telecommunications network with at least verification information relating to a subscriber of the group; and access node means, the first radio telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call to the access node means and the access node means terminates control signals of the first format from the switching controller and transfers the call to the subscriber terminal in the second telecommunications network associated with the called subscriber via the fixed geographical access point. The subscriber terminals may terminate local wire loops of the second telecommunications network. The storing means may be located at at least one premises of the group of subscribers. The storing means may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by first the radio telecommunications network. The access node may located at the premises of the group of subscribers. The access node means may be adapted for two-way communication with the switching controller. The access node means may also include means for decoding and coding voice messages, e.g. vocoding. The access node may include the storing means and the access node may also be remote from the premises of the group of subscribers. The storing means may include a programmable read only memory for storing the subscriber identifier. The storing means is preferably adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention also includes a first access node for use with a radio telecommunications network, comprising: communication means for receiving signals from, and transmitting signals to the radio telecommunications network in a first format; means for storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node, the storing means being adapted to provide the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers; and the access node being adapted so that when a call is placed to a subscriber in the group via the radio telecommunications network, the access node terminates control signals of the first format from the radio telecommunications network and transfers the call to the output port associated with the called subscriber. The storing means may be located at the premises of the group of subscribers. The storing means may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications system. The first access node may be located at the premises of the group of subscribers. The first access node may also include means for decoding and coding voice messages, e.g. vocoding. Alternatively, the access first node may be remote from the premises of the group of subscribers. The storing means may include a programmable read only memory for storing the subscriber identifier. The storing means may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention may include a first responder suitable for use in a network-wise geographically fixed position in a first telecommunications network, comprising: means for storing at least one subscriber identity information of a subscriber to a second radio telecommunications network and a key; verification means for generating a result of an encryption algorithm with the aid of the key; and means for transmitting the result towards the second radio telecommunications network via the first telecommunications network. The responder may also include communication processing means for receiving an alphanumeric message and control data from the second radio telecommunications network via the first telecommunications network and for transmitting only the alphanumeric message to the verification means.
- The present invention may also include a second method of operating a telecommunications system including a first radio telecommunications network having at least one radio coverage area and a second telecommunications network including subscriber terminals, the method comprising the steps of: storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points; providing the first radio telecommunications system with at least verification information relating to a subscriber of the group based on the stored subscriber identifier information when a request therefor is sent from the first radio telecommunications system; and when a call is placed to a subscriber in the group: the first radio telecommunications network generates control signals of a first format and transmits the control signals and the call to an access node means; and the access node means terminates the control signals of the first format and transfers the call towards the subscriber terminal in the second telecommunications network via the fixed geographical access point associated with the called subscriber. In the second method the providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the first radio telecommunications network, and transmitting the result to the first radio telecommunications network. The providing step may also include sending the alphanumeric indication to a responder at the premises of the subscriber, computing the result in the responder ad transmitting the result to the access node means. The second method may also include the step of decoding and coding voice messages in the access node means. The second method may include providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention may also include a third method of operating an access node for use with a radio telecommunications network, comprising: storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node; providing the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers on request; and when a call is placed to a subscriber in the group: receiving control signals of a first format and the call from the radio telecommunications network, and terminating the control signals of the first format and transferring the call to the output port associated with the called subscriber. The providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network, and transmitting the result to the radio telecommunications network. The providing step may also include sending the alphanumeric indication to a responder at the premises of the subscriber, computing the result in the responder and transmitting the result to the access node. The third method may also include the step of decoding and coding voice messages in the access node. The third method may also include the step of providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention may also include a fourth method of operating a responder in a network-wise geographically fixed position in a first telecommunications network, comprising: storing in the responder at least one subscriber identity information of a subscriber to a second radio telecommunications network and a key; generating a result of an encryption algorithm with the aid of the key; and transmitting the result towards the second radio telecommunication network via the first telecommunications network. The generating step may include receiving an alphanumeric message and control data from the second radio telecommunications network and for transmitting only the alphanumeric message to means within the responder for verification of the responder and its associated subscriber.
- The present invention may also include a third telecommunications system comprising: a first radio telecommunications network having at least one radio coverage area and a switching controller; and a second telecommunications network including at least one subscriber terminal; the telecommunications system further comprising: means for storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the second subscriber identifier being associated with one subscriber of the group, the storing means being associated with at least a responder in a network-wise geographically fixed position for providing the first radio telecommunications network with at least verification information relating to a subscriber of the group; the first radio telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call towards the location of the storing means, in response thereto the responder provides verification information of the called subscriber to the radio telecommunications network and the call is transferred to the subscriber terminal in the second telecommunications network. The subscriber terminals may terminate local wire loops of the second telecommunications network. The storing means and the responder may be located at at least one premises of the group of subscribers. The responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by first the radio telecommunications network. The responder is preferably adapted for two-way communication with the switching controller. The responder may be located at the premises of the group of subscribers but the storing means may be remote from the premises of the group of subscribers. The storing means may include a programmable read only memory for storing the subscriber identifier. The responder may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention also includes a second access node for use with a radio telecommunications network, comprising: communication means for receiving signals from, and transmitting signals to the radio telecommunications network; means for storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node, a responder adapted to provide the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers; and the access node being adapted so that when a call is placed to a subscriber in the group via the radio telecommunications network, the access node transfers the call to the output port associated with the called subscriber. The storing means may be located at the premises of the group of subscribers. The responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications system. The second access node may be located at the premises of the group of subscribers. Alternatively, the second access node means may be remote from the premises of the group of subscribers. The second access node may also include means for decoding and coding voice messages. The storing means may include a programmable read only memory for storing the subscriber identifier. The responder may include verification means for computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network. The second access node may also include means for decoding and coding voice messages, e.g. vocoding. The responder may be adapted to provide the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention also includes a fifth method of operating a telecommunications system including a first radio telecommunications network having at least one radio coverage area; and a second telecommunications network including subscriber terminals, the method comprising the steps of: storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group; and when a call is placed to a subscriber in the group: the first radio telecommunications network transmits the call towards the storing means; in response thereto, transmitting to the first radio telecommunications system from a responder in a network-wise geographically fixed position at least verification information relating to the called subscriber based on the stored subscriber identifier information; and transferring the call to the subscriber terminal in the second telecommunications network. In the fifth method, the step of transmitting verification information may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the first radio telecommunications network, and transmitting the result to the first radio telecommunications network. The fifth method may include the step of decoding and coding voice messages. The fifth method may include providing the first radio telecommunications network with authentication information relating to a subscriber of the group.
- The present invention may also include a sixth method of operating an access node for use with a radio telecommunications network, comprising: storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node; and when a call is placed to a subscriber in the group: providing the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers from a responder in a network-wise geographically fixed position; and transferring the call to the output port associated with the called subscriber. In the sixth method the providing step may include computing a result using an encryption algorithm and a key from an alphanumeric indication provided by the radio telecommunications network, and transmitting the result to the radio telecommunications network. The sixth method may also include the step of decoding and coding voice messages. The sixth method may also include the step of providing the first radio telecommunications network with authentication information of a subscriber.
- The present invention deviates radically from conventional systems in that it may provide geographically fixed receiver functionality for the subscriber information which specifies the subscriber's identity in a mobile telecommunications system. This is achieved in accordance with the present invention by associating the Subscriber Identification Information (SII) with a fixed geographical reference point rather than with a particular device. In accordance with embodiments of the present invention the access point lies outside the radio telecommunications system. In one embodiment, the control signals of the mobile telephone system are transmitted right up to the subscriber's premises. Alternatively, the control signals of the mobile telecommunications system may be terminated in an access node which may be conveniently located in a wired base station. In this embodiment, the control signals of the mobile telecommunications system such as the DTAP signals, are not transmitted to the customer premises. Also, the voice coding typically used in mobile telecommunications systems is terminated at the access node and not at the customer premises. In another embodiment of the invention the functions of the access node described above may be shared between an access base station and responders on the customer's premises. The responder is capable of responding to certain inquiries initiated in the wireless network, e.g. to provide subscriber identity information or to provide the result of an encryption algorithm carried out on a random number supplied from said wireless network.
- The present invention allows integration of a radio telecommunications network with another telecommunications network, particularly a wireline network. This may provide the advantage of improved subscriber services, in particular to allow a wireless system operator to provide greater bandwidth and additional services in an economical way without duplicating networks.
- The dependent claims define further embodiments of the present invention. The present invention, its embodiments and advantages will now be described with reference to the following drawings.
-
- Fig. 1 is a schematic representation of an integrated network in accordance with a first embodiment of the present invention.
- Fig. 2 is a schematic representation of a second embodiment of the present invention.
- Fig. 3 is a detailed schematic representation of the second embodiment of the present invention.
- Fig. 4 shows various possible arrangements of a TRAU in GSM systems and in accordance with the present invention.
- Fig. 5 shows a message sequence in accordance with the second embodiment of the present invention.
- Fig. 6 is a schematic representation of a converter in accordance with the second embodiment of the present invention.
- Fig. 7 is a schematic representation of a third embodiment of the present invention.
- Fig. 8 is a detailed schematic representation of the third embodiment of the present invention.
- Fig. 9 is a schematic functional block diagram of an access node in accordance with the third embodiment of the present invention.
- Fig. 10 shows a message sequence in accordance with the third embodiment of the present invention.
- Fig. 11 is a schematic representation of ways of authenticating subscribers in accordance with the present invention.
- Fig. 12 is a schematic representation of a fourth embodiment of the present invention.
- Fig. 13 is a schematic representation of a SII responder in accordance with the fourth embodiment of the present invention.
- Fig. 14 shows a message sequence in accordance with the fourth embodiment of the present invention.
- Fig. 15 is a schematic representation of the another embodiment of the present invention in which the mobile network communicates with a fixed terminal via a PSTN.
- Fig. 16 is a schematic representation of an access node in accordance with another embodiment of the present invention.
- Fig. 17 is a schematic representation of a bridge in accordance with another embodiment of the present invention.
- Fig. 18 is a schematic representation of the logical connections of the embodiment of the present invention shown in Fig. 15.
- Fig. 19 is a table showing the signaling termination locations in accordance with one embodiment of the present invention.
-
- The present invention will be described with reference to certain embodiments and with reference to certain schematic drawings but the invention is not limited thereto but only by the drawings. The present invention will be described with reference to a system similar to the European GSM system as described in the related ETSI technical specifications but the invention is not limited thereto.
- A first embodiment of a network in accordance with the present invention will be described with reference to Figs. 1 to 3. As shown schematically in Fig. 1, generally a
wireline network 10 is connected to awireless network 20. Thewireless network 20 as shown is of the switched node type but the present invention is not limited thereto. For instance thewireless network 20 could be implemented as an intelligent network. In the following it will be assumed that thewireless network 20 is a GSM type system but the invention is not limited thereto. TheGSM network 20 may cover several countries and may be divided into national GSM networks (PLMN) service areas. There may also be several GSM networks within one country operated by different providers and their respective coverage areas may overlap. - As shown in Fig. 1 the
conventional wireline network 10 has conventional terminating devices such as telephones 11 or fax machines or a permanently respondingterminal 12. The terminal 12 may be answering machine or a voice mail box or a personal computer (PC) configured to receive and store fax and other data transmissions as well as voice messages. Thewireless GSM network 20 may include one or more regions each associated with a mobile services switching center (MSC) 21, 27-29. The connection between thewireline network 10 and thewireless network 20 is via a particular type of MSC known as a gateway mobile services switch center (GMSC) 21. TheGMSC 21 is connected to a Home Location Register (HLR) 26 and the other MSC's 27 - 29. TheHLR 26 is a database which stores subscriber data, such as location data and Subscriber Identification Information (SII). EachMSC 21, 27-29 serves an area which may include one or more radio coverage areas associated with radio transceivers or base stations (BS) 34-36. EachMSC 21, 27-29 may service several BS's 34-36. The smallest location area of thenetwork 20 is called a cell. Associated with each MSC is a visitor location register (VLR, not shown) which is a database which stores information of the location of mobile transceivers 22-25 visiting the area controlled by therespective MSC 21, 27-29. TheHLR 26 in turn stores information with respect to which VLR/MSC 21, 27-29 a particular mobile transceiver 22-25 is visiting which is used for routing purposes. - A call from the
wireline network 10 is received at theGMSC 21, alternatively, a call from one of the mobile transceivers 22-25 is received at the respective MSC, 21, 27-29. In both cases, theHLR 26 is interrogated as to routing. The call is then completed with one of the mobile phones 22-25. If themobile phone 22, 23; 24; 25 is in its home area, the call is routed through therespective home MSC 27; 28; 29. If the mobile phone 22 - 25 is roaming, therespective MSC 27; 28; 29 responsible for radio coverage area in which the mobile device is located, acts as the visited MSC or VMSC. Communications between theGMSC 21 and the other MSC's 27 - 92 are carried out bylines 32. Communications between theHLR 26, theGMSC 21 and the MSC's 27 - 29 are carried out vialines 33 in the conventional way. The MSC's 21, 27 - 29 may be connected to base stations (BTS) 34 - 36 via intermediate base station controllers (BSC, not shown). - Within the
GSM network 20, the subscriber identification information (SII) includes the International Mobile Subscriber Identity IMSI which comprises a GSM mobile country code MCC (three digits), a mobile network code MNC (two digits) and a mobile station identification number MSIN (ten digits). The MSIN is unique within a certain national GSM network and can be specified by the network provider. The SII is stored in a subscriber information storing means or SISM. In the GSM system the SISM is a separate Subscriber Identity Module (SIM) in each mobile transceiver or mobile station MS 22-25. An SIM is a module separate from any memory or processor used for establishing communication between a mobile station and thenetwork 20. Preferably the means for storing the SII is detachable or removable, e.g. in the form of a SIM integrated circuit card or SIM-ICC. The SIM-ICC is used in the GSM for at least three important functions: - verification an/or authentication of the subscriber to prevent access of unregistered users,
- radio path ciphering, in particular ciphering of all subscriber information to prevent third-party tapping, to this end the SIM-ICC contains keys to be used in ciphering operations;
- subscriber identity protection, to prevent subscriber location by third parties (e.g. to identify that a subscriber is far from home).
- In accordance with the present invention verification means confirming that a communication with a particular subscriber terminal has been made. For example, this includes verification that a subscriber may use the facilities of the radio telecommunications network or confirmation that the terminal contacted is the right one. Further, verification is required in a mobile telephone system on a call-by-call basis for billing purposes.
- Authentication means in accordance with the present invention that information is provided from which a check can be made that a specific subscriber's identity has been registered in the radio telecommunications network. Authentication is linked to the subscriber's identity as defined by the subscriber identity information and is required by the radio telecommunications network as this information relates to the confirmation that the particular subscriber may access certain services provided by the radio telecommunications network and associated only with that subscriber. Hence, more information may be required for authentication than for verification. For instance, the authentication information may include which services the subscriber may use.
- Preferably, the means for storing the SII (the SISM) in a mobile station is protected against unauthorized direct entry (this includes the subscriber). Integrated circuit SIM cards are designed to be very difficult to duplicate (except by the issuer who is usually a network provider or operator). Further details of the GSM system may be found, for instance, in the book by Michel Mouly and Marie-Bernadette Pautet, "The GSM system for Mobile Communications", Cell & Sys, 1992.
- In accordance with the present invention, the
wireless network 20 also includes access node means 48 for associating the Subscriber Identification Information (SII) with a fixed geographical reference point. As shown in Fig. 1, embodiments of the present invention may include a access base station (ABS) 40, operatively connected on one side to one of the MSC's (28) and on the other side to asecondary network 30 which may be a further wireline network but the present invention is not limited thereto. TheABS 40 does not need to have a radio coverage area and can be connected via thesecondary network 30 to one or more fixed terminal devices 45 - 47. Wireless telephone networks generally have no method of linking a subscriber to a particular access point. In a pure wireless environment the network access is a pooled resource that is used in a first-come-first-served manner. The access node means 48 in accordance with the present invention provides fixed geographical access points to the wireless network for the terminal devices 45 - 47 and the relevant group of subscribers. The devices 45-47 are effectively part of a virtual cell which is not part of a radio coverage area of themobile network 20. Theaccess node 48 may be provided by aseparate converter 70, theABS 40 or by theABS 40 in combination with other devices such as aresponder 77 as will be described later. In accordance with the present application a fixed geographical access point does not include within its meaning simply restraining a mobile station, e.g. by tethering it to a power socket during charging of its internal battery but relates to a network-wise fixed point, i.e. a fixed point, to which calls can be switched. Merely tethering or fixing a MS to a wall does not deprive the MS of its network-wise mobility capability even if it is restrained physically from moving. On the other hand, the subscriber identity Information (SII) handled by the access node does not provide mobility in theGSM network 20. For instance, in accordance with a embodiment of the present Information any SII associated with a access node may be restricted to the virtual cell associated with the access node. Any attempt to extract the SII and use it in a mobile station will fail, as the first attempt at location updating in themobile system 20 will result in interrogation of theHLR 26 and access will be denied as the mobile station will not be in the virtual cell associated with access node. - Fig. 2 shows schematically a second embodiment of the present invention. As shown, the
secondary network 30 is a wireline network and theaccess base station 40 is provide by a wired base transceiver station (WBTS) 50. The access node in accordance with this embodiment is provided by aconverter 70. Other details of the network are as described with respect to Fig. 1. One ormore WBTS 50 and one or more conventional base transceiver stations (BTS) 37 may be included in a Base Station Subsystem 39 (BSS). Theconventional BTS 37 controls a radioaccess coverage area 43 and is adapted to receive and transmit messages via radio channels to the mobile stations 22-25. TheWBTS 50 andBTS 37 may be connected to a basestation controller BSC 38 which in turn, is connected to theMSC 28 as part of the network and switching sub-system (NSS) 41 of a GSM network. Terminal devices 56 -60 are connected bywire lines 51 to 55 to theWBTS 50. In accordance with the second embodiment of the present invention, the wire lines 51 - 55 not only carry the user messages or "traffic" but also carry signals necessary for controlling calls. Wire lines 51 - 55 may be leased lines from a local public telephone utility. As theWBTS 50 is part of thewireless network 20, the signaling protocols used are those of thewireless network 20 e.g. the DTAP signals between theMSC 28 and a mobile device 22-25. As shown in Fig. 3 schematically, aconversion device 70 is provided on the subscriber's premises and therefore provides geographically fixed access points to theradio telecommunications network 20.Converter 70 contains at least one and usually two subscriber information storing means (SISM) 71, 72 which may be detachable and are preferably protected against direct entry, e.g. some kind of SIM, particularly SIM-ICC's with the associated ICC readers. When the terminal devices 56 - 60 are ISDN telephones, normally two independent telephone line connections (i.e. two directory numbers) are provided for one ISDN connection to a subscriber's premises. In accordance with the present invention SII's are stored in theconverter 70 for use with themobile network 20 rather than directory numbers, hence, the need for two SISM's 71, 72. The SISM's 71, 72 are necessary so that theterminal devices 56 to 60 on the wireline part of the system appear to thewireless system 20 like any other mobile telephone used on thewireless system 20. The SISM's 71, 72 contain the subscriber identity information which is also stored in theHLR 26 along with the relevant routing information. Theconverter device 70 terminates the wireless system control signals, e.g. DTAP signals which are normally transmitted between a mobile station and an MSC, and forwards the user messages or "traffic" to theterminal device terminal devices converter 70. The control signals and the user messages from theMSC 28 are passed through theBSC 38 and theWBTS 50 transparently. In effect theconverter 70 emulates all the functions of a mobile transceiving device while using a wired interface for transmission and reception instead of a radio interface. Once theconverter 70 is in service, the operation is indistinguishable from a normal radio interface. For instance, if thewireless system 20 is a GSM system and the subscriber'sterminal equipment converter 70 that, for instance, contains two SIM-ICC's 71, 72. All service and service inquiries with the SIM-ICC's 71, 72 can be handled locally by theconverter 70. Theconverter 70 terminates all mobile network signaling, e.g. DTAP signaling from theMSC 28, and converts it to ISDN Q931 signaling for the subscriber'sterminal equipment terminal equipment WBTS 50 does not, as a rule, query the SIM-ICC's 71, 72. - The exact functions to be performed by the
converter 70 depend upon the compression and coding techniques used for theair interface 44 of theradio telecommunications system 20. Generally, every effort is made to reduce bit rate on theair interface 44 by compression of signals. This is particularly true of voice signals which take up a lot of band width if not compressed. Telephone calls from an MS 22 - 25 enter the system at theBTS 37 in a compressed or coded form. At some point these signals must be rate adapted to landline bit rates and, if necessary decoded. This is done usually in a Transcoder and Rate Adapting Unit (TRAU) which may be placed in theBTS 37, theBSC 38 or closer to theMSC 28. These three possibilities are shown schematically in Fig. 4. In the GSM system the signals enter or leave theTRAU 42 on the mobile station side at 16kB/s and the voice signals are vocoded and leave or enter theTRAU 42 respectively on theMSC 28 side at 64kB/s and the voice signals are coded in the A- or µ law. Vocoding is any method of compressing voice signals and one definition may be the analysis and synthesis of voice, which uses either a vocal track model or quantizes subbands of a speech waveform to remove redundant speech information thereby enabling transmission of the required voice information in a reduced bandwidth. In older designs, theTRAU 42 was placed in the BTS 37 (first alternative in Fig. 4). With these systems theaccess 48 in accordance with the present invention receives uncompressed voice signals and data signals at 64kB/s from the MSC 28 (indicated by the dotted linearrow leaving BSC 38 towardsABS 40 in the upper alternative of Fig. 4). These can be converted easily into ISDN standard signals in theconverter 70. However, in accordance with the present invention theABS 40 may include, even if theTRAU 42 is normally in theBTS 37, aTRAU 42 in order to exactly emulate the rest of thewireless network 20. In this case, theconverter 70 also has to include aTRAU 42 in order to carry out the vodecoding and rate adaption to the system of the terminal devices 56 - 60, e.g. 64kB/s of the ISDN. This duplication of TRAU processors is technically unnecessary but may provide the advantage that messages are transmitted on the wire lines 51-55 in compressed form, e.g. 16kB/s, and that if these lines 51-55 are leased ISDN lines, the transfer of the messages is cheaper. - In alternative (and more common) systems the
TRAU 42 may be placed in theBSC 38 or be associated more closely with the MSC 28 (second and third alternatives in Fig. 4). If theaccess node 48 in accordance with the present invention is connected to astandard BSC 38 in such a GSM system, it receives vocoded speech and signals at 16kB/s (indicated by the linearrows leaving BSC 38 towardsABS 40 in the lower two alternatives of Fig. 4). In accordance with a modification of the second embodiment of the present invention these compressed signals are passed to theconverter 70 which includes a TRAU for vodecoding and rate adaption of messages so that they are adapted to the system used by the terminal devices 56 - 60, e.g. 64kB/s of ISDN. Placing theTRAU 42 closer to theMSC 28 in the GSM system reduces the cost of leased lines as compressed signals are transmitted along the leased lines, therefore requiring less capacity. - In a further embodiment of the present invention the
access 48 may be connected to an MSC 28 (shown by the arrows on the right hand side of Fig. 4 which indicate a connection at 64 kB/s directly to ABS 40) or through aspecial BSC 38 in such a way that 64kB/s A- or µ-law coded uncompressed signals are received by theconverter 70, i.e. by bypassing theconventional TRAU 42. This avoids the vodecoding step in theconverter 70, but introduces a non-standard connection to theMSC 28 and may increase the cost of transmitting messages along the leased lines betweenMSC 28 and theconverter 70. - If the
secondary network 30 includes some form of radio communication or if there is a possibility that lines 51 - 55 are unsafe, e.g. unsafe leased lines, it is preferred if the SISM's, e.g. SIM-ICC's, inconverter 70 also include ciphering keys and theconverter 70 is capable of ciphering messages involving subscriber identity information transmitted from the SISM and for deciphering messages from theMSC 28 involving such data. Such a capability may be provided by a SIM-ICC. If no radio communication is required in the secondary network, e.g. it is a wireline network, ciphering is not preferred in accordance with the present invention. - One possible message sequence for setting up a call in accordance with the present invention is shown schematically in Fig. 5. In setting up a communication between the
wireless network 20 and theterminal devices HLR 26 and thehome MSC 28 need to be informed of the existence of the active SISM's 71, 72 which may be SIM-ICC's. Once theconverter 70 with the SIM-ICC's 71, 72 has been installed, the operation of the complete system is relatively simple. In order to register withwireless network 20, theconverter 70 sends a request for a location update. In the GSM system, this message is called a Location Update Request (LUR) and is part of the RIL3-MM protocol. The LUR contains enough information to identity the subscriber. For instance, the LUR may contain the IMSI mentioned above. Alternatively, the request may contain a Temporary Mobile Subscriber Identity TMSI as is known from the GSM system. TheMSC 28 may respond immediately to theconverter 70 or may interrogate theHLR 26. From the LUR, theMSC 38 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto. The answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message. The messages between theMSC 28 and theHLR 26 are part of the MAP/D protocols and are not discussed here in detail. It should be noted that location updating may still be required even though there is only one possible "location" for the SIM-ICC's 71 and 72, as it may be necessary to restore the databases in the VLR or theMSC 28 after failures. - Before or after sending an LUR accept message,
MSC 28 may request authentication from theconverter 70. It is preferred if authentication is of the active type with an exchange between theconverter 70 and theMSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this the MSC sends an Authorization Request which is also part of the GSM RIL3-MM protocol. The Authorization Request contains a randomly generated number RAND which is to be processed by theconverter 70.Converter 70 requests one of SIM-ICC's 71, 72 to generate a response, the SRES, from the RAND preferably using a algorithm such as A3 which is a one-way or trap-door function. Such a function allows easy calculation of SRES from Ki and RAND whereas the computation of Ki knowing RAND and SRES should be as complex as possible. In accordance with the present invention ciphering and deciphering of telephone calls is not considered to be necessary, so that the session key Kc is only generated as an option.Converter 70 responds toMSC 28 with the SRES. TheMSC 28 compares the SRES fromconverter 70 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and same Ki for the subscriber involved. If both agree,converter 70 is now registered inwireless network 20 as if it were a mobile station. Alternative methods are included in accordance with the present invention, e.g. different keys may be used by theconverter 70 and theHLR 70. - A call to one of the
terminal devices Terminal devices wireless network 20. A call to thesedevices wireless network 20 or will be directed towireless network 20 through a GMSC such as 21. For each subscriber information stored in SISM's, e.g. SIM-ICC's, 71, 72 in theconverter 70, the routing information to therespective MSC 28 is stored in theHLR 26. As far as thewireless network 20 is concerned, it sees the SISM's 71, 72 inconverter 70 just as if they were SIM-ICC's in conventional mobile stations. Any call to one of theterminal devices HLR 26 to theMSC 28, and via theBSC 38 and theABS 40 as, for instance, exemplified by the WBTS 50 and so to theconverter 70. Theconverter 70 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented. The 16kB/s coded messages are decoded inconverter 70 to 64kB/s A- or µ-law signals. For both 16kB/s or 64kB/s messages, control signals are converted to ISDN format and the call is transferred to therelevant terminal device MSC 28 sends a Setup Request toconverter 70. This request is also part of the RIL3-CC protocol of GSM. This request is received byconverter 70 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of theISDN terminal devices relevant device converter 70 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol.Converter 70 operates in this case as a protocol interworking device. The call setup is now complete and the call may continue. - Fig. 6 is a schematic representation of a
converter 70 in accordance with a further embodiment of the present invention capable of carrying out the message sequence of Fig. 5.Converter 70 may include two communication lines 67, 68 for communication betweenports 66 ofconverter 70 and theterminal device 56 and theABS 40 ofnetwork 20, respectively.Converter 70 may also include a communication processing means 64 in the form of a conventional programmable microprocessor or microcontroller for processing data from, and preparing data for transmission to theterminal device 56 or to theABS 40. The processing means 64 may include aTRAU 42 depending upon which embodiment of the present invention is implemented. Processing means 64 preferably includes somememory 65 for storing of programs, data, etc. Processing means 64 may also provide the protocol conversion and rate adaption between the ISDN system on one side and thewireless network 20 on the other.Converter 70 also preferably includes a Secure Access Module 61 or SAM. This SAM 61 stores personal confidential data such as the IMSI and the key Ki in anauthentication memory 63 as well as the authentication algorithms, e.g. A3. The SAM 61 also preferably includes asecure processor 62 for calculating SRES (and if required, the dormant key Kc) from the random number RAND. SAM 61 may be implemented as an Integrated Circuit Card, i.e. it may be a SIM-ICC with an appropriate reader as is known from GSM mobile stations. - One advantage of the system in accordance with the above embodiments is that standard terminal devices 56- 60 may be used, e.g. ISDN telephones. Another advantage of the system is that the control signals and other aspects of the
wireless network 20 such as voice coding must be taken right up to the customers premises. This allows flexibility. One disadvantage may be that value added services may be provided inwireless network 20 which may need to be emulated in theconverter 70, e.g. speed dial numbers or customized short messages services (SMS). This requires eachconverter 70 to include a processor to carry out the complex coding/decoding routines and rate adaption and to provide the value added services. This can make eachconverter 70 more expensive. - As shown schematically in Fig. 7, as the number of individual subscribers to the
wireless network 20 who use thesecondary network 30 increases, the number of connections to theABS 40, e.g. as exemplified by aWBTS 150, may increase, forinstance 120 or more subscribers perWBTS 150. TheWBT5 150 may be physically located within the central office of the local telephone utility although it may belong to the operator of thewireless network 20. In accordance with a third embodiment of the present invention, theaccess node 48 is provided by a single node of thenetwork 20, e.g. byABS 40. One example of theaccess node 48 of the third embodiment will be described with reference to aWBTS 150. In accordance with the third embodiment, the processing power and the SISM's of theconverters 70 described in the second embodiment may be concentrated in theABS 40, e.g. inWBTS 150. - As shown schematically in Fig. 8, two SISM's 73, 74 for two
terminal devices access node 48 in accordance with the third embodiment.Access node 48 may be a wired BTS (WBTS 150). Reference numerals in Fig. 8 which are the same as reference numbers in Figs. 1 to 7 refer to the same components. It is understood that theMSC 28 shown in Fig. 7 interfaces with the wireless andwireline networks wired BTS 150, the invention is not limited thereto. Referring to Fig. 1, theWBTS 150 in accordance with the third embodiment may be theABS 40 communicating with terminal devices 45 - 47 via asecondary network 30 which may be any transmission network of which a wireline network is only one example. - In accordance with the third embodiment, messages from
MSC 28 are transmitted to theWBTS 150 via theBSC 38. TheWBTS 150 includes a plurality of SISM's 73, 74, e.g. if there are 120 subscriber loops connected to theWBTS 150, there would be 240 SISM's 73, 74. All control signals from thewireless network 20 are terminated in theWBTS 150 and any necessary vodecoding and rate adaption are performed in theWBTS 150 before transmitting the signal to theterminal devices secondary network 30, e.g. ISDN. Further, a processor inWBTS 150 is adapted to carry out the value added services and to provide the necessary storage space for the SMS (short message service). At the customers premises, thewire lines ISDN NT1 device 49 as is customary for ISDN. No decoding or rate adaption or value added service processing is performed at the customer premises. Instead, ports of theWBTS 150 provide the geographically fixed access point for thewireless network 20.WBTS 150 may be located in thewireless network 20. All signals which leave theWBTS 150 towards the terminal devices are in the format of thesecondary network 30. All signals which leave theWBTS 150 towards theMSC 28 are in the format of thewireless network 20. Accordingly, control signals such as DTAP for thewireless network 20 towards theMSC 28 are generated inWBTS 150, and all DTAP signals received from theMSC 28 are terminated at theWBTS 150. Similarly, all control signals required for theISDN telephones NT1 49 are terminated at theWBTS 150 and all signals going towards theNT1 49 are generated at theWBTS 150. - The SISM's 73, 74 may be in the form of SIM-ICC's inserted into a suitable receiving and reading devices (not shown). However, the location of so many physical cards within the
WBTS 150 takes up a lot of space. Further, there is a significant possibility that one or more SIM-ICC's may not be placed into the correct slot leading to difficulties in billing, maintenance and problem tracking. In accordance with the present invention it is preferred if the subscriber identity information is stored in theaccess node 48 in a more convenient form, e.g. as an insertable programmable read only memory (PROM) block or as software representations of SII's, i.e. a virtual SIM or VSIM, in which the SIM is stored on access node 4 in conventional non-volatile memory. - For a mobile station (MS), the GSM specifications specify a SIM-MS interface that allows value-added service information to be stored within the SIM. Examples are speed dial numbers or customized Short Message Service (SMS) text strings. With a VSIM there is no physical SIM to store any extra service information. Thus the
access node 48 stores such information in non-volatile memory capable of surviving shut down and re-boot. Further, the software running on the processor ofaccess node 43 may handle the virtual MS-SIM interface and support the conventional SIM/MS services behavior. - An embodiment of the
access node 48 suitable for use in the third embodiment of the present invention will be described with reference to Fig. 9.Access node 48 includescommunication connections wireless network 20 via ports of switching means 93. These connections are normally made with anMSC 28 as described above. The signaling andmessage connections MSC 28 and theaccess node 48. Thecommunications connections Access node 48 also includes signaling and usermessage communications connections secondary network 30, e.g. to the customer premises and to terminal devices such asISDN telephones Communications connections WBTS 150 theconnections wireline wired BTS 150. - The blocks in Fig. 9 represent certain functions of the
access node 48. They do not necessarily represent individual hardware elements of thenode 48. The functions to be described with respect tonode 48 may be implemented in a variety of ways, e.g. by conventional processors running associated software specifically adapted to perform the functions in accordance with the present invention and memory devices, e.g. disc drives, as well as other communications peripheral equipment, e.g. suitable ports and digital switches. Thenode 48 may be controlled by anode controller 91 which may be a processor which carries out common functions necessary to control thenode 48. Thenode controller 93 controls and co-ordinates the functions of thevoice processor 96, the operations andmaintenance unit 97, thesignaling interworking unit 92 as well as the switching means 93. The operations andmaintenance unit 97 will not be described in detail. Thevoice processor 96 may include a transcoder and rate adapter to code and decode between the compressed voice data from thewireless network 20 and the uncompressed voice data transmitted to and from theend terminals signaling interworking unit 92 terminates the signing messages (represented by block 94) in the format of thewireless network 20 as well as terminating the signaling messages (represented by block 95) in the format of thesecondary network 30.Signal interworking unit 92 converts signal formats between thewireless network 20 and thesecondary network 30. Switching means 93 provides connections to and from the ports of theaccess node 48 as well as routing signals to the appropriate processors withinaccess node 48. -
Access node 48 also includes astore 98 for the subscriber identity information (SII), e.g. for storing theSII WBTS 150. This store may be in the form of an addressable read only non-volatile memory, e.g. a detachable block of programmable read-only memory, which has been pre-programmed with the subscriber identity information such as the IMSI and the private key Ki. The encryption algorithms may be stored in thesame store 98 and may be executed by thenode controller 91 or by a separate dedicated authentication processor (not shown). TheSII store 98 may also be conventional addressable non-volatile memory storage, i.e. e.g. a hard disc and the SII store is then described in accordance with the present invention as a Virtual Subscriber Identity Module or VSIM. Alternatively, and less preferably, thestore 98 may be a plurality of SIM-ICC's, each slotted into a respective card reader (not shown). - When a message including signaling and a user message in the format of the
wireless network 20, e.g. GSM, is received by a switching means 93 via thecommunications lines wireless network 20 are terminated at 94 and the signals converted into the format of the secondary network in thesignaling interworking unit 92 as well as any rate adaption necessary between thewireless network 20 and thesecondary communications network 30. User messages in the form of voice or data information are directed to thevoice processor 96 which carries out any rate adaption and transcoding required and prepares the messages for transmission in thesecondary network 30. The converted signaling information as well as the voice and/or data messages from thevoice processing unit 96 is then transmitted to thesecondary network 30 via theunit 95, the switching means 93 and its ports and therelevant communications connections - A possible message sequence for the third embodiment is shown schematically in Fig. 10. In order to register with
wireless network 20, theaccess node 48, e.g. aWBTS 150, generates a LUR using the subscriber identity information from therelevant SII store 98 and sends the LUR to theMSC 28 under the control of thenode controller 91 and the switching means 93. TheMSC 28 may respond immediately to theaccess node 48 or may interrogate theHLR 26. From the LUR, theMSC 38 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto. The answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message. It should be noted that location updating may still be required even though there is only one possible "location" for the SII's 73 and 74, as it may be necessary to restore the databases in the VLR (visiting location register) or theMSC 28 after failures. - Before or after sending an LUR accept message,
MSC 28 may request authentication from theaccess node 48. It is preferred if authentication is of the active type with an exchange between theaccess node 48 and theMSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this the MSC sends an Authorisation Request containing the randomly generated number RAND which is to be processed by theaccess node 48. Theaccess node 48 generates a response, the SRES, from the RAND preferably using an algorithm such as A3 which is a one-way or trap-door function. To do this, thenode controller 91 of theaccess node 40 retrieves the private key Ki stored as part of therelevant SII SII store 98. Thenode controller 91 calculates the SRES using the relevant algorithm and responds to theMSC 28. TheMSC 28 compares the SRES from theaccess node 48 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and same Ki for the subscriber involved. If both agree, the SII's 73, 74 ofaccess node 48 are now registered inwireless network 20 as if they belonged to a mobile station. - For each subscriber information in SII's 73, 74 in the
access node 48, the routing information to therespective MSC 28 is stored in theHLR 26. Any call to one of theterminal devices HLR 26 to theMSC 28, and via theBSC 38 to theaccess node 48. Theaccess node 48 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented. The 16kB/s coded messages are decoded inaccess node 40 to 64kB/s A- or µ- law signals. For both 16kB/s or 64kB/s messages, control signals are converted to ISDN format and the call is transferred to therelevant terminal device MSC 28 sends a Setup Request to accessnode 48. This request is also part of the RIL3-CC protocol of GSM. This request is received byaccess node 48 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of theISDN terminal devices relevant device access node 48 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol. The call setup is now complete and the call may continue. Theaccess node 48 operates in this embodiment as a protocol interworking device. - A method of initial authentication of mobile station SIM-ICC's 75, SIM's 73, 74 and virtual SIM's 76 is shown schematically in Fig. 11. For
SIM cards 75 which are to be inserted into conventional mobile stations, theSIM card 75 is usually purchased from an independent SIM card supplier who provides not only a completedSIM card 75 but also a data file containing the same information. The data file is read into the Authentication Center (AuC) of theHLR 26 for service provisioning and into the wireless network provider's operation sub-system OSS 80 for billing and tracking. SIM's 73, 74 and VSIM's 76 are created in a similar way. The SIM or VSIM provider generates a data file of SIM or VSIM information that is read into the AuC ofHLR 26 and into the mobile network operator's OSS 80. SIM PROM's 76 are created from the data file and installed in theaccess node 48. Alternatively, the software inaccess node 48 is updated to provide the VSIM's. Theaccess node 48 assigns two SIM's/VSIM's to each line 51 - 55. For each SIM/VSIM - A schematic representation of a fourth embodiment of the present invention is shown in Fig. 12. In this embodiment the access node means 48 in accordance with the present invention is represented by
responder 77, whereby some functions are carried out by theWBTS 250. The functions of theaccess node 48 in accordance with the present invention are therefore shared betweenWBTS 250 and theresponder 77. With reference to Fig. 1, theABS 40 is represented by thewired BTS 250 in accordance with this embodiment.WBTS 250 is similar to theWBTS 150 of the third embodiment and is responsible for converting all messages to and from the format of thesecondary network 30, e.g. ISDN.WBTS 250 has the same communication processing capability as theWBTS 150 of the third embodiment. However,WBTS 250 does not include a store for the SII.WBTS 250 of the fourth embodiment does not contain the SII's 73, 74 of theWBTS 150 of the third embodiment, instead the subscriberidentity information SII responder 77. The term "responder" in this application refers to an electronic device which provides a specific response to a query, e.g. returns SRES when interrogated with a RAND. Theresponder 77 therefore bears some superficial similarity to so-called "dongles" which are hardware devices for copy protection of software. It will be understood that the use of the word "responder" in the present application relates only to the specific devices disclosed in this application and does not relate to commercially available copy protection devices.Responder 77 may include two SIM-ICC's with associated readers and may be located on the ISDN S/T bus in the subscriber premises. Vocoding and DTAP termination are in theWBTS 250 as for the third embodiment. Theresponder 77 does not provide protocol interworking, this is carried out in theWBTS 250. TheWBTS 250 is able to access eitherSII responder 77 for authentication requests. - One implementation of the
responder 77 in accordance with the present invention is shown schematically in Fig. 13. Theresponder 77 may be a small (8x4x2cm) unit that connects to the S/T bus of anNT1 49 via a port 87. Theresponder 77 takes-up one of the 8 allowed terminals on the S/T bus.Responder 77 stores two subscriberidentity informations SII non-volatile memory 85. SISM 81 includes anauthentication processor 82 for generating the SRES from the RAND.Responder 77 includes acommunication processor 83 for carrying out the ISDN layer 1&2 logic to connect to the S/T bus.Responder 77 preferably has amemory 84 dedicated to thecommunication processor 83. A suitable voltage Vdd is provided by the S/T bus for driving thememories processors responder 77 responds only to a single fixed Terminal Equipment Identifier (TEI) on the ISDN D-channel. Theresponder 77 is transparent to messages on ISDN B-Channels. Other terminals on the bus are unaffected by D-channel messaging to and fromresponder 77 since they ignore messages not sent to their own TEI.Responder 77 may be implemented as an application specific integrated circuit, e.g. a single chip processor, and does not need to be programmable. - The
WBTS 250 converts any message fromMSC 28 into the format expected by theauthentication processor 82 of theresponder 77. These messages are sent to theresponder 77 via the ISDN D-Channel. Thecommunication processor 83 ofresponder 77 removes any data in the message relating to the ISDN format and presents the message (e.g. RAND) to theauthentication processor 82. Any response from theauthentication processor 82 is then converted into ISDN D-channel format bycommunication processor 83 and returned to theWBTS 250. As described above, ISDN layer 3 messaging is between theMSC 28 and the SISM 81, with theprocessor 83 ofresponder 77 providing onlylayer WBTS 250 and theresponder 77 can respond to the following types of queries: - a. IMSI Queries.
- b. Verification and authentication requests
- c. SIM System value-added services.
-
- A possible message sequence in accordance with the fourth embodiment is shown schematically in Fig. 14. In order to register with
wireless network 20, theWBTS 250 interrogates theresponder 77 requesting theresponder 77 to provide the IMSI of the subscriber using the ISDN D-channel. Thecommunications processor 83 of theresponder 77 transmits the request to theauthentication processor 82 which retrieves the IMSI from thememory 85. The IMSI is sent in clear to theWBTS 250.WBTS 250 generates a LUR using the IMSI obtained from theresponder 77 and sends the LUR to theMSC 28. TheMSC 28 may respond immediately to theWBTS 250 or may interrogate theHLR 26. From the LUR, theMSC 28 can derive the system address of the HLR 26 (e.g. from look-up tables) and can relay the request thereto. The answer provided may be either a Location Updating Reject message or, more likely, a Location Update Accept message. - Before or after sending an LUR accept message,
MSC 28 may request authentication from theWBT5 250. It is preferred if authentication is of the active type with an exchange between theWBTS 250 and theMSC 28 of a random number and of the transform of this number by an encryption function using a secret key personal to the subscriber. To do this theMSC 28 sends an Authorisation Request via theWBTS 250 containing the randomly generated number RAND which is to be processed by theresponder 77. TheWBTS 50 transmits the request on the ISDN D-channel to theresponder 77. Thecommunications processor 83 inresponder 77 relays the RAND to theauthentication processor 82 after removing any data relevant only to D-channel signaling. Theauthentication processor 82 applies the relevant algorithm on the RAND, e.g. A3, and generates a response, the SRES, using the private key Ki stored as part of theSII memory 85. Theresponder 77 sends the SRES to theMSC 28 via theWBTS 250. TheMSC 28 compares the SRES from theWBTS 250 and the SRES generated by the wireless network 20 (e.g. in the AuC) from the same RAND and the same Ki for the subscriber involved. If both agree, theSII responder 77 is now registered inwireless network 20 as if it belonged to a mobile station. - For each subscriber information in
responder 77, the routing information to therespective MSC 28 is stored in theHLR 26. Any call to one of theterminal devices HLR 26 to theMSC 28, and via theBSC 38 to theWBTS 250. TheWBTS 250 receives the call either as 16kB/s compressed signals or as 64kB/s uncompressed signals depending upon which embodiment of the present invention is implemented. The 16kB/s coded messages are decoded inWBTS 250 to 64kB/s A- or µ-law signals. For both 16kB/s or 64kB/s messages, control signals are converted to ISDN format and the call is transferred to therelevant terminal device MSC 28 sends a Setup Request toWBTS 250. This request is also part of the RIL3-CC protocol of GSM. This request is received byWBTS 250 and transformed into a Setup message in the Q931 protocol of a standard ISDN telecommunications system and sent to one of theISDN terminal devices responder 77 as they are not addressed to the TEI of theresponder 77. Therelevant device WBTS 250 transforms this message into the Call Confirmed message of the GSM RIL3-CC protocol. The call setup is now complete and the call may continue.WBTS 250 operates in this embodiment as a protocol interworking device. - In the event of a failure involving the
responder 77 theWBTS 250 would not be able to associate the respectiveterminal device WBTS 250 to allow certain calls to be originated from that terminal device. Emergency calls could be recognized and routed using GSM emergency call protocols. All other originations could be routed to a service center (not shown). The service center phone number and a service IMSI to use for the call would be defined asWBTS 250 attributes at the OMCR. The GSM system specifies a SIM-MS interface that allows value-added service information to be stored within the SIM-ICC. Examples are speed dial numbers, customized Short Message Service (SMS) text strings. If value-added services are supported, the software ofWBTS 250 supports these. - A further embodiment of the present invention will be described with reference to Figs. 15 to 18. Items with the same reference numbers in Figs. 15 to 18 as used in previous embodiments refer to the same components as described for previous embodiments. As shown in Fig. 1, the
access node 40 may communicate withterminals 45 to 47 at customers premises via asecondary network 30 in accordance with the present invention. In particular, the secondary network may be a Public Switched Telephone Network (PSTN). The present invention includes a method of providing fixed terminal access to a mobile telephone network, subscriber's mobile stations in the mobile telephone network being addressable by subscriber information references, the method comprising the steps of providing a fixed access node (FAC) 350 between themobile telephone network 20 and awireline PSTN 30 whereby the FAC is part of themobile network 20 as well as providing asecond interface unit 120 between thePSTN 30 and a fixed terminal of a subscriber of the mobile telephone network, the fixed terminal being associated with a subscriber information reference in themobile telephone network 20 and routing calls from the subscriber's fixed terminal destined for themobile telephone network 20 and routing calls to the subscriber's fixed terminal from themobile telephone network 20 through theFAC 350 and thesecond interface unit 120 and thePSTN 30. - Generally, a
wireline PSTN 30 will not support all the functions of a mobile telecommunications system required for mobile network services, e.g. authorization, location updating, point-to-point short message service (SMS), point-to-multipont cell broadcast message service, i.e. it will not have in its set of communication commands those required for these services. Hence, there cannot be a straight mapping from one system to the other. In accordance with the present invention, such services may be provided for the subscriber'swireline terminals PSTN 30 will be described with particular reference to the SMS but the present invention is not limited thereto. - Fig. 15 shows a schematic representation of a further embodiment of the present invention. The
subscriber terminals 56 to 58 may be a normal fixedaccess terminal 56 or may be enhanced fixedaccess terminals mobile telephone network 20. This enhanced set of services is a superset of the services supported by the terminal 56. In particular, terminal 56 is not able to handle SMS messages directly but must carry out a special procedure to retrieve the SMS message. Each such terminal 56-58 has a subscriber information reference in the mobile telephone network 20 (and not a directory number in the PSTN). TheMSC 28 is part of themobile telephone network 20 and the fixed access subscriber terminals (FASTMN) 56-58 for themobile telephone network 20 can communicate with theMSC 28 but are not connected directly thereto and can only communicate with theMSC 28 via aPSTN 30. In accordance with this embodiment aFAC 350 of themobile telephone network 20 in combination with one ormore bridges 120 support the mobile network services such as voice or data transmission as well as the specialized services such as SMS, location updating, authentication to and from theterminals 56 to 58 through thePSTN 30 to themobile telephone network 20. In Fig. 15 only onebridge 120 is shown but it will be understood thatseveral bridges 120 may be able to communicate with one or more MSC's 128 via aFAC 350. - The
PSTN 30 may provide an ISDN in accordance with standards such as theCCITT Series 1 standards. It is preferred if thePSTN 30 supports common channel signing as described for instance in the book "ISDN and Broadband ISDN with Frame Relay and ATM" by William Stallings, Prentice-Hall International Inc. 1995. By using common channel signaling it is possible to deliver information messages via signaling paths without involving bearer channels and it even possible to deliver data messages when all the bearer channels are busy. An ISDN may be include a basic rate connection to theterminals - Assuming the
PSTN 30 supports ISDN services, there are several ways that an a signaling message may be transferred to a customer premises from themobile network 20. In particular use may be made of the end-to-end signaling of the ISDN user part such as the user-to-user signaling methods referred to here as UUS1 to UUS3 as defined by ETSI standard Q.931. UUS1) A first possibility is that the message exchange is limited to a single 140 byte message appended to a SETUP message. This has the disadvantage that certain messages from themobile network 20, e.g. an SMS message, may be 160 bytes long, i.e. the procedure would have to be performed twice. This alternative has the advantage that the messages can be transmitted even if all bearer channels are busy. UUS2) Secondly, the signaling message may be sent in messages before a call has been set up. For instance, the first part of an signaling message may be contained in the SETUP message. The terminal replies with an ALERTING message. After this exchange there may be further exchange of messages until one of the sender and receiver issues a RELEASE message. This procedure does not set up a call completely and there is therefore no charge. Further, the message may be transmitted even when the bearer channels are busy. UUS3) Thirdly, the signaling message may be transmitted during a normal call. This requires an active call merely to send a signaling message which is a wasteful and expensive method unless there is regular traffic to the terminals 56-58. A further danger is that if there are several terminals 56-58 on one bus at the customer premises, it may be impossible to prevent another terminal picking up on a call. Hence, there is no guarantee that a particular message arrives at the intended recipient. In accordance with the present invention it is preferred if all calls at the customer's premises are channeled through aspecial circuit element 120 which can then organize the receipt of signaling messages. - To use these communication methods, the terminals 56-58 in accordance with the present invention are adapted to include messages in accordance with UUS1 to UUS3 above and to receive these messages. It is anticipated that these terminals 56-58 are not stimulus devices but rather include sufficient processing and memory capacity to interpret the received messages and to construct messages from standard commands and data input into the terminals, e.g. from a keyboard. For instance the terminals 56-58 may be personal computers running dedicated communication software.
- Some operators of PSTN's allow transfer of signaling along the D-channel using the X.25 packet protocol, if necessary by a separate X25 packet network. Hence, signaling messages to and from the
mobile network 20 may be sent as D channel X 25 packets (Dch packets) in accordance with the present invention. This requires a device at the customer's premises capable of a full X.25 protocol conversion even when there is only a requirement for telephones as terminals, i.e. only voice messages, which may result in an unacceptable increase in subscriber equipment costs. - Yet another option where a separate signaling channel is not available is to embed the signaling between the
FAC 350 and theFAC bridge 120 within a bearer channel of thewireline network 30. This requires a device at the customer's premises able to demodulate in-band signaling without affecting other voice or data traffic which may result in an unacceptable increase in the cost of subscriber equipment. This option would also require an active bearer circuit for transporting any message even those unrelated to a call which may increase costs compared to the methods described above. - Normal mobile telephone traffic, e.g. voice or data, between the
mobile telephone network 20 and the terminals 56-58 may be carried out in the following way. The FASTMN 56-58 are provided with Subscriber Information references within themobile network 20 as for a normal mobile station within themobile network 20. A call to one of the FASTMN 56-58 is therefore made using this subscriber information as if the call were being placed to a mobile telephone. The call will be directed toMSC 28 by conventional routing means within themobile network 20. For routing purposes, the HLR 26 (Fig. 1) stores the relationship between the Subscriber Information of the relevant FASTMN 56-58 and its associatedMSC 28. This may be a semi-permanent relationship as the FASTMN 56-58 are almost always in the fixed pseudo-cell associated with theFAC 350. AtMSC 28 the call is routed toFAC 350 which may be configured as shown in Fig. 16 which is similar to the node described with reference to Fig. 9 but with additional processing functionality as described below to provide a digital interface to thePSTN 30. Both thebridge 120 and theFAC 350 may have directory numbers (DN) within thePSTN 30 and these DN's may be used by the bridge andFAC - A schematic representation of a
FAC 350 in accordance with one embodiment of the present invention is shown in Fig. 16. Reference numbers which are the same as in Fig. 9 represent similar components.FAC 350 includescommunication connections wireless network 20 via ports of switching means 93. These connections are normally made with anMSC 28 as described above. The signaling andmessage connections MSC 28 and theFAC 350.Communications connections FAC 350 also includes signaling and usermessage communications connections 107, 108, respectively, for transmission to and from thesecondary network 30, e.g. to the customer premises and to terminal devices such as telephones 56-58 via the ports of switching means 93 and for example by a trunking protocol such as ETSI ISUP or other SS7 protocols, ETSI Primary Rate Interface protocol or a similar trunking protocol. - The blocks in Fig. 16 represent certain functions of the
FAC 350. They do not necessarily represent individual hardware elements of thenode 350. The functions to be described with respect tonode 350 may be implemented in a variety of ways, e.g. by conventional processors running associated software specifically adapted to perform the functions in accordance with the present invention, and memory devices, e.g. disc drives, as well as other communications peripheral equipment, e.g. suitable ports and digital switches. TheFAC 350 may be controlled by anode controller 91 which may be a processor which carries out common functions necessary to controlFAC 350. Thenode controller 91 controls and co-ordinates the functions of thevoice processor 96, if such is required, the operations andmaintenance unit 97, thesignaling interworking unit 92 as well as the switching means 93. The operations andmaintenance unit 97 will not be described in detail. The present invention includes transmitting messages from themobile network 20 to the terminals 56-58 in compressed or vocoded form. The present invention also includes avoice processor 96 which may include a transcoder and rate adapter to code and decode between compressed voice data from thewireless network 20 and uncompressed voice data transmitted to and from the end terminals 56-58. Thesignaling interworking unit 92 terminates the signaling messages (represented by block 94) in the format of thewireless network 20 as well as terminating the signaling messages (represented by block 95) in the format of the relevant trunking protocol from thePSTN 30.Signal interworking unit 92 may convert signal formats between thewireless network 20 and the trunking protocol. For example, signaling interworkingunit 92 may provide X 25 packet handling and conversion. Switching means 93 provides connections to and from the ports of theFAC 350 as well as routing signals to the appropriate processors withinFAC 350. As will be explained later, switching means 93 may include a multiplexer. -
FAC 350 also includes amemory 105.Memory 105 may be used for the subscriber identity information (SII) ofterminals memory 105 in this case may include being in the form of an addressable read only non-volatile memory, e.g. a detachable block of programmable read-only memory, which has been pre-programmed with each subscriber identity information such as the IMSI and the private key Ki. The encryption algorithms may be stored in thesame memory 105 and may be executed by thenode controller 91 or by a separate dedicated authentication processor (not shown). Thememory 105 may also be conventional addressable non-volatile memory storage, i.e. e.g. a hard disc and the SII store is then described in accordance with the present invention as a Virtual Subscriber Identity Module or VSIM. Alternatively, and less preferably, the memory may include a plurality of SIM-ICC's, each slotted into a respective card reader (not shown). - In accordance with the present invention the SII of terminals 56-58 may be alternatively located at the
bridge 120 in the form of SIM cards or as virtual SIM's stored in memory, i.e. VSIM's, or in theterminals -
Memory 105 includes a structure which stores the correspondence between the SII ofterminals bridge 120 in thePSTN 30. When a message including signaling and a user message in the format of thewireless network 20, e.g. GSM, is received by a switching means 93 via thecommunications lines wireless network 20 are terminated at 94 and the signals converted into the appropriate format for thePSTN 30 and in particular the relevant trunking protocol in thesignaling interworking unit 92 as well as any rate adaption necessary between thewireless network 20 and thePSTN 30. User messages in the form of voice or data information are directed to the voice anddata processor 96 which carries out any rate adaption and transcoding required and prepares the messages for transmission to thesecondary network 30.Node controller 91 includes a call routing function. From the SII of the called party thenode controller 91 interrogates thememory 105 and obtains the DN of theappropriate bridge 120 associated therewith.Node controller 91 then sets up a call withbridge 120 viaPSTN 30. The call may be set up using a one stage or two stage addressing procedure. For the two stage procedure, when the call is answered bybridge 120, the transported signaling information as well as the voice and/or data messages from thevoice processing unit 96 are then transmitted to thebridge 120 via thePSTN 30.Processor 96 andsignal interworking function 92 are provided with any necessary communications drivers for communication with thePSTN 30 using the relevant trunking protocol. - As shown in Fig. 17 the
bridge 120 may be connected to an S/T bus from anISDN NT1 129 at the subscribers' premises. TheNT1 129 acts as a digital interface between the circuits of thePSTN 30 and the S/T bus 122. The present invention is not limited to the use of an ISDN NT1 interface for connection to the local loop of thePSTN 30 and thebridge 120 may be directly connected to the local loop, i.e. it may also include a digital interface which carries out the same functions as an NT1 interface. In particular, theNT1 129 or the directly connectedbridge 120 is adapted to convert incoming messages from the PSTN to a S/T bus format and outgoing messages from the S/T bus format to an appropriate PSTN format. Each PSTN circuit connected to the NT1 preferably includes one or more bearer or B-channels and one signaling or D-channel as is well known for an ISDN basic rate interface (BRI). The traffic channels of thePSTN 30, i.e. B-channels, may pass transparently through thebridge 120 to the terminals 56 - 58. For instance, this would normally happen when thebridge 120 is handling voice telephone calls to and from thePSTN 30. The D channel signaling from thePSTN 30 is preferably separately terminated at thebridge 120. OneD channel termination 125 is used for PSTN messaging and the other 126 to drive thelocal bus 122 with theterminals 56 to 58. For instance, where D-channel messages are transmitted as packets in thePSTN 30, thebridge 120 would include a processor andmemory 124 for receiving and storing any signaling commands associated with the packets as well as the packets themselves. Adisplay 127 may be provided for displaying when a message has arrived and thebridge 120 may additionally activate audible signals at theappropriate terminal - When the call arrives at the
FAC 350, its format depends on the use and position oftranscoders 42 in themobile network 20 as has already been described with respect to Fig. 4. Although the detailed configuration of theFAC 350 may depend upon the position of transcoders in themobile network 20, it is not anticipated that this will significantly alter the fundamental concepts behind the present invention. Hence, a call may include compressed voice data as typically required for the air interface of a mobile telephone network or may be A-law or µ-law coded or similar as is known for normal transmission of telephone calls in a PSTN. Independent of which format is used, theFAC 350 sets up a call with thebridge 120 through theNT1 106, 129 by dialing the DN of thebridge 120. Whenbridge 120 answers the call, theFAC 350 generates a DTAP "answer" message back to theMSC 28 and connects the bearer channel themobile telephone network 20 to thebridge 120. In order to do this signaling data from themobile telephone network 20 may mapped to the D-channel of theISDN PSTN 30 by thesignaling interworking function 92, and the traffic message is mapped by thevoice processor 96 to a "B" channel or part of a multiplexed "B" channel if it is for instance a compressed voice message.Bridge 120 receives the B-channel and D-channel messages as placed on the S/T bus by theinterface NT1 129. If theFASTMN bridge 120 transparently. In another option, the B-channel messages may be compressed (e.g. vocoded) to increase capacity in which case theprocessor 124 of thebridge 120 converts these into the appropriate form, e.g. A- or µ-law. - For a call originating at a
FASTMN bridge 120 sets up a call with theFAC 350 by dialing the DN of theFAC 350 in thePSTN 30. Again a one-stage or two-stage addressing technique may be used to complete the call withmobile network 20. In order to provide a uniform billing strategy for themobile telephone network 20 in thePSTN 30, thebridge 120 may simply initiate a callback call withFAC 350 so that all calls within thePSTN 20 always appear to originate atFAC 350. For these purposes bridge 120 may include within thecontrol logic unit 124, call routing functions to be able to place a call to the DN of theFAC 350 through theNT1 129 and thePSTN 30. Further, where X25 signaling is used on the D-channel thecontrol logic unit 124 in combination with theDch termination unit 125 provides X25 packet handling and generation in thebridge 120. The procedure for seting up a call may be as follows when the terminal 57, 58 includes a SIM card. The caller attempts to place a call from one of theterminals bridge 120 sets up a call with theFAC 350 and transfers not only the called number but also its own DN and the subscriber identity information from the SIM (one-stage addressing). Thenode controller 91 interrogates thememory 105 to see if the SII is stored there. If the record is found the FAC forwards the call to theMSC 28 in a format as if it were a call from a conventional mobile station. If there is no record, theFAC 350 initiates a local updating procedure and theMSC 28 decides whether an authentication of the SIM associated with the fixed terminal is necessary. Signaling between themobile network 20 and the SIM is carried out within the existing call between thebridge 120 and theFAC 350 using in-call information transfer. Once the SIM is authenticated a location updating is performed and the SIM is now registered at theHLR 26 as being associated with theMSC 28 and thememory 105 of theFAC 350 is updated with the new association between the SIM and the DN of thebridge 120. From this point on the owner of the SIM will be billed for all calls from therespective terminal - The mismatch between the format of the messages from the
mobile network 20 and thePSTN 30 depends on the services supported by both networks. As an example of a PSTN non-supported mobile service the transfer of SMS messages will be described. The SMS is a specialized GSM feature that guarantees delivery of short text messages between a mobile station and another terminal capable of receiving SMS messages. With reference to Fig. 10, the SMS is organized by a Short Message Service Center (SMSC) 110. When a mobile user wishes to send a short message (SM) to another user the message is first sent to theSMSC 110. TheSMSC 110 queries theHLR 26 to determine the last known location of the mobile and then directs the message to theappropriate MSC 28. ThisMSC 28 attempts to deliver the message and reports success or failure back to theSMSC 110. If the attempt fails, the message is stored at the SMSC and a pointer is stored in the mobile system, e.g. in theHLR 26, indicating that a message is waiting. As soon as the mobile reappears in the system and makes a location updating or access attempt, theHLR 26 informs theSMSC 110 that the mobile is now back in the system. TheSMSC 110 initiates a further delivery attempt. If successful, the short message is stored in the mobile station, e.g. in the SIM, and a message is displayed on the LCD screen of the mobile station indicating that a message has arrived. - As explained above, in accordance with the present invention the SIM of a subscriber having a terminal such as 57, 58 is not necessarily located at the subscriber's premises nor in a subscriber's terminal so that some additional facility must be provided to offer this service in an integrated network. Additional problems may occur if the SIM is located at the customer's premises. If the mobile network requests authentication or a location update, it is possible that the
FAC 350 cannot obtain a connection through to one of theFASTMN FAC 350, e.g. in the form of a VSIM or virtual SIM as described above. However, if the SMS message is stored in the SIM or VSIM in theFAC 350, the subscriber must access it using a local special procedure. In accordance with an embodiment of the present invention the point of storage of the SMS message and the location of the Subscriber Information store may be different and may even be on different sides of thePSTN 30. Accordingly, it is one aspect of the present embodiment that theFAC 350 stores a record which associates each terminal 56-58 not only with the relevant DN of thebridge 120 but also where the SIM is stored, i.e. in theFAC 350, therelevant bridge 120, in a responder or converter on the S/T bus of the relevant fixed terminal or in the terminal itself. This is necessary so that the relevant query may be initiated to the correct place in order to interrogate the SIM. - For transmitting the mobile network services such as SMS different procedures may be used. The user-user communication methods UUS1 and UUS2 described above are preferred for all specialized communications such as authentication or location updating if these services are supported by the PSTN because these methods do not require a FAC to FAC bridge bearer channel. One preferred method when the SIM is placed in a
converter 70 or a responder 72 (both described above) on the S/T bus 122 or in aFASTMN bridge 120,FAC 350 marks the relevant SIM as disconnected and uses the PSTN supplementary service "Call Completion Busy Subscriber" (CCBS) to notify it when a line to therelevant terminal - An example will now be provided of transmission of an SMS message but the present invention is not limited only to this service. Assuming the
PSTN 30 supports ISDN services, there are several ways that an SMS message could be transferred to a customer premises. Firstly, the mobile network protocols such as DTAP which include SMS messages may be transmitted during a normal call using the UUS3 service described above. This requires an active call merely to send a message of about 160 bytes which is a wasteful and expensive method. A further danger is that if there are several terminals on one bus at the customer premises, it may be impossible to prevent another terminal picking up on a call - hence there is no guarantee that a message arrives at the intended recipient. In accordance with the present invention it is preferred if all calls at the customer's premises are channeled through a special circuit element which organizes the receipt of SMS messages. - Secondly, the SMS may be sent in messages before a call has been set up using the UUS2 service mentioned above. For instance, the first part of a SMS message may be contained in the SETUP message. The terminal replies with an ALERTING message. Now there may be further exchange of messages until the SMS message has been completely transmitted and one of the sender and receiver issues a RELEASE message. This procedure does not set up a call completely and there is therefore no charge within the
PSTN 30. - A third possibility is that the message exchange is limited to a single 140 byte message appended to a SETUP message as part of the UUS1 service mentioned above. As an SMS message may be 160 bytes long, the procedure would have to be performed twice.
- Fourthly, the SMS message could be sent using the X25 Dch packet service mentioned above.
- Finally, the SMS message may be sent along a B-channel if one is available. One preferred embodiment of the present invention is to transmit compressed voice messages from the
MSC 28 to theFAC 350. By multiplexing messages on the fixed lines between these two nodes of themobile network 20 the costs of transmission can be reduced. These compressed messages are transmitted through thePSTN 30 multiplexed into one B-channel of a BRI using for instance the protocol I465/V.120. Four 16kb/s compressed voice communications may be multiplexed into one B-channel of a BRI. Three other 16 kb/s compressed voice communications may be multiplexed and transmitted on the other B-channel of the BRI. The remaining 16kb/s sub-channel on the second B-channel may be used for transmission of signaling from and to themobile network 20 which cannot be mapped onto the D-channel simply, e.g. a short message of 160 bytes. This embodiment of the present invention requires a multiplexer in the switching means 93 ofFAC 350 and in theDch termination unit 125 of thebridge 120. Obviously a first active call must be set up on the relevant B-channel for one of the subscriber's terminals which depends from therelevant FAC bridge 120 for the SM to be transmitted but there is no need for this call to be from or to the intended recipient of the short message at the subscriber's premises. - Summarizing the above it is preferred in accordance with the present invention if all calls arriving at a customer's premises are controlled by a special circuit element which has one or more of the capabilities mentioned above, e.g. X.25 protocol and receipt of SMS messages on the D-channel during SETUP or on a D-channel or a B-channel during an active call. As shown in Figs. 15 and 18 the customer premises has a
bridge 120 which controls all calls receivable by theterminals 56 to 58 and transmits these calls to the terminals on itsown bus 122. - As shown schematically in Fig. 17 the
bridge 120 preferably includes sufficient intelligence, i.e. processors and memory, to carry out at least one of the methods described above: UUS1 to UUS3, Dch packets or B-channel multiplexing, for delivering SMS messages. As shown in Fig. 17 thebridge 120 is connected to the S/T bus from an NT1 however, the present invention is not limited thereto and thebridge 120 may be directly connected to the local loop. - The logical connections between the
FAC 350 and thebridge 120 are shown schematically in Fig. 18. The ISDN layers 1, 2, 3 are shown as L1, L2, and L3. The bridge protocol layer does two things: 1) it carries application data to the subscriber terminals, and 2) it transports commands and information between theFAC 350 and thebridge 120. - The
terminals bus 122 are unaware that they are not connected directly with theFAC 350.Bridge 120 is preferably capable of receiving both point-to-point and point-to-multipoint protocols so that it can process SMS and cell broadcast messages from themobile telephone network 20. - The Subscriber Information Module (SIM) may be located at different positions in accordance with the present embodiment and the position has an effect on the operation and capabilities of the
FAC 350 and/or thebridge 120. - 1) The SIM may be in the
FAC 350, e.g. as a virtual SIM. This has the advantage that location updating and authentication by the mobile network can be carried out without any communication with thebridge 120. TheFAC 350 can be configured in such a way that SMS messages do not terminate at the SIM or VSIM but are communicated to or through thebridge 120. The SMS message can be stored in thebridge 120 or in one of theterminals 56 to 58 is equipped to do so. - 2) The SIM may be located in the
bridge 120 either as a SIM card or as a VSIM. Thebridge 120 then includes the function of aresponder 72 in accordance with the present invention. The SMS message can be stored in thebridge 120 or in one of theterminals - 3) Alternatively, a
converter 70 or aresponder 72 containing a SIM may be located on thebus 122 which theFAC 350 or theFAC bridge 120 may query. - 4) The SIM may also be located in one of the
terminals common terminal terminals bridge 120 sets up a call with theFAC 350 and transfers not only the called number but also its own DN and the subscriber identity information from the new SIM. Thenode controller 91 interrogates thememory 105 to see if the SII is stored there. As this is a new SIM, there is no record and theFAC 350 initiates a procedure for a location update of the new SIM.. Signaling between themobile network 20 and the new SIM is carried out within the existing call between thebridge 120 and theFAC 350. Once the update is complete theMSC 28 may choose to authenticate the SIM. When these two steps are complete, the new SIM is registered at theHLR 26 as being associated with theMSC 28 and thememory 105 of theFAC 350 is updated with the new association between the new SIM and thebridge 120. From this point on the owner of the new SIM will be billed for all calls from the terminal 57, 58. -
- Although the above embodiment has been illustrated with respect to SMS, other services are included within the scope of the embodiment. For example, a call is in progress via the
bridge 120 and theFAC 350. A second call for the same subscriber arrives at theFAC 350. TheFAC 350 sends information about the second caller to thebridge 120 which is forwarded to the subscriber terminal on its display. The subscriber can then decide to put the first call on hold and activate the second call or activate a 3-way call. These call commands are transmitted transparently through thePSTN 30. The service is run and controlled strictly by themobile network 20 and the terminating terminal 56-58. ThePSTN 30 is unaware that the service is taking place. - Fig. 19 shows the signaling termination locations for one preferred embodiment of the present invention as applied to a GSM mobile telephone system communicating with a fixed
terminal 56 via a PSTN. The terminal type may be a standard ETSI BRI terminal which supports a minimum of services and does not support a SIM card. More advanced terminals such as 57, 58 may support SIM cards and different signaling termination locations. Signaling between an MSC and a base station controller (BSC) in the GSM system which terminates on either of these is transmitted using the BSSMAP protocol. TheFAC 350 terminates and answers these signals as if it were a BSC. Any signaling for mobility management or for call control using the DTAP protocol (i.e. mobile system protocols) will be terminated on theMSC 28 and theFAC 350, respectively, as shown in Fig. 19. Queries with respect to Subscriber Information will terminate at different locations depending on where the Subscriber Information is stored, e.g. in theFAC 350 or thebridge 120 for aterminal type 56. For instance, in accordance with this embodiment the SIM card is stored at theFAC bridge 120 and location updating is performed by a query from the FAC to the FAC bridge. (For enhanced terminals such as 57 or 58 the SIM card may be located in the terminal and the option of a FAC bridge query is shown in Fig. 19, i.e. message termination at the FAC bridge and enhancedterminal 57.) In this embodiment SMS messages will be transferred across thePSTN 30 by one of the methods described above and will be stored locally in thebridge 120 operating as a sort of "e-mail" or "voice-mail" box. Transmission of the message between theFAC bridge 120 and the terminal 56 requires a special procedure to be initiated by the terminal 56 to interrogate thebridge 120. - While the invention has been shown and described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes or modifications in form and detail may be made without departing from the scope and spirit of this invention.
Claims (22)
- A method of providing fixed terminal access to a mobile telecommunications network, subscriber's mobile stations in the mobile telecommunications network being addressable by subscriber information references, the method comprising the steps of:providing a first interface unit between the mobile telecommunications network and a wireline network;providing a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable with a subscriber information reference of the mobile telecommunications network and being connected to a local loop of the wireline network; andproviding services of the mobile telecommunication network to and from the subscriber's fixed terminal through the first interface and the wireline network.
- A method according to claim 1, further comprising a second interface unit between the wireline network and the fixed terminal of a subscriber of the mobile telecommunications network and providing mobile telecommunication network services through the first and second interfaces and the wireline network.
- A method according to claim 2, wherein the wireline network is a PSTN and the first and second interface units are each provided a directory number within the PSTN.
- A method according to claim 3, wherein the provision of services includes routing calls from the subscriber's fixed terminal destined for the mobile telecommunications network and routing calls to the subscriber's fixed terminal from the mobile telecommunications network through the first interface unit and the wireline network.
- A method according to any previous claim, wherein at least portions of messages from the mobile telecommunications network are encapsulated by the first interface unit so that they are transmitted transparently through the wireline network.
- A method according to any of claims 2 to 5, wherein at least portions of the messages from the fixed subscriber terminal are encapsulated by the second interface unit so that they are transmitted transparently through the wireline network.
- A method according to any previous claim, further comprising the steps of:storing identifiers of a group of a plurality of subscribers to the mobile telecommunications network, each subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points;providing the mobile telecommunications network with at least verification information relating to a subscriber of the group based on the stored subscriber identifier information when a request therefor is sent from the mobile telecommunications network; and when a call is placed to a subscriber in the group:the mobile telecommunications network generates control signals of a first format and transmits the control signals and the call to access node means; andthe access node means terminates the control signals of the first format and transfers the call towards the subscriber terminal in the wireline network via the fixed geographical access point associated with the called subscriber.
- A method according to any of the claims 1 to 6, further comprising the steps of:storing identifiers of a group of a plurality of subscribers to the mobile telecommunications network, each the subscriber identifier being associated with one subscriber of the group;and when a call is placed to a subscriber in the group:the mobile telecommunications network transmits the call towards the storing means;in response thereto, providing the mobile telecommunications network with at least verification information by the transmitting to the mobile telecommunications network from access node means in a network-wise geographically fixed position the at least verification information relating to the called subscriber based on the stored subscriber identifier information; andtransferring the call to the subscriber terminal in the wireline network.
- A method according to claim 7 or 8, wherein the first interface unit comprises the access node means.
- A system for providing fixed terminal access to a mobile telecommunications network, comprising:a first interface unit between the mobile telecommunications network and a wireline network;a fixed terminal of a subscriber of the mobile telecommunications network, the fixed terminal being addressable by a subscriber information of the mobile telephone network and being connected to the local loop of the wireline network; andthe first interface unit having means for transmitting any message associated with the subscriber's fixed terminal through the first interface unit and the wireline network.
- A system according to claim 10, further comprising a second interface unit between the wireline network and the fixed terminal of a subscriber.
- A system according to claim 10 or 11, wherein the wireline network is a PSTN and the first and second interface units are each provided with a directory number within the PSTN.
- A system according to any of the claims 10 to 12, wherein the first interface unit is adapted to encapsulate at least a portion of a message from the mobile telecommunications network so that it is transmittable transparently through the wireline network.
- A system according to any of the claims 11 to 13, wherein the second interface unit is adapted to encapsulate at least a portion of a message from the fixed subscriber terminal so that it is transmittable transparently through the wireline network.
- A system according to any of the claims 10 to 14, further comprising:a switching controller in the mobile telecommunications network for generating and transmitting control signals of a first format; andmeans for storing identifiers of a group of a plurality of subscribers to the mobile telecommunications network, each subscriber identifier being associated with one subscriber of the group and also being associated with a fixed geographical access point of a plurality of fixed geographical access points, the storing means being adapted to provide the mobile telecommunications network with at least verification information relating to a subscriber of the group; andaccess node means, the mobile telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call to the access node means and the access node means terminates control signals of the first format from the switching controller and transfers the call to the subscriber terminal in the wireline network associated with the called subscriber via the fixed geographical access point.
- A system according to any of claims 10 to 14, further comprising:a switching controller in the mobile telecommunications network;means for storing identifiers of a group of a plurality of subscribers to the first radio telecommunications network, each the second subscriber identifier being associated with one subscriber of the group, the storing means being associated with access node means in a network-wise geographically fixed position for providing the mobile telecommunications network with at least verification information relating to a subscriber of the group;the mobile telecommunications network being adapted so that when a call is placed to a subscriber in the group, the switching controller directs the call towards the location of the storing means, in response thereto the access node means provides verification information of the called subscriber to the mobile telecommunications network and the call is transferred to the subscriber terminal in the wireline network.
- A system according to any of claims 15 or 16, wherein the first interface unit comprises the access node means.
- An interface unit for connection between a fixed terminal at a subscriber's premises and a wireline network, the interface unit comprising:a processor for processing messages between a mobile telecommunications network and the fixed terminal via the wireline network, the processor being adapted to encapsulate at least a portion of an outgoing message in the mobile telecommunications network format from the fixed terminal in an appropriate wireline format so that the outgoing message from the fixed terminal is transmittable transparently through the wireline network to the mobile telecommunications network.
- An interface unit for connection between a wireline network and a mobile telecommunications network, the interface unit comprising:a processor for processing messages to be transmitted between a mobile telecommunications network and a fixed terminal at a subscriber's premises via the wireline network, the processor being adapted to convert incoming messages in a wireline network format to a mobile telecommunications network format and to encapsulate at least a portion of an outgoing message having the mobile telecommunications network format in an appropriate wireline network format so that the outgoing message from the mobile telecommunications network is transmittable transparently through the wireline network to the fixed terminal at the subscriber's premises.
- An access node for use with a mobile radio telecommunications network, comprising:communication means for receiving signals from, and transmitting signals to the mobile telecommunications network in a first format;means for storing identifiers of a group of a plurality of subscribers to the mobile telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node, the storing means being adapted to provide the mobile telecommunications network with at least verification information relating to a subscriber of the group of subscribers; andthe access node being adapted so that when a call is placed to a subscriber in the group via the mobile telecommunications network, the access node terminates control signals of the first format from the mobile telecommunications network and transfers the call to the output port associated with the called subscriber.
- An access node for use with a radio telecommunications network, comprising:communication means for receiving signals from, and transmitting signals to the radio telecommunications network;means for storing identifiers of a group of a plurality of subscribers to the radio telecommunications network, each the subscriber identifier being associated with one subscriber of the group and also being associated with one of a plurality of output ports of the access node,a responder adapted to provide the radio telecommunications network with at least verification information relating to a subscriber of the group of subscribers; andthe access node being adapted so that when a call is placed to a subscriber in the group via the radio telecommunications network, the access node transfers the call to the output port associated with the called subscriber.
- A responder suitable for use in a network-wise geographically fixed position in a first telecommunications network, comprising:means for storing at least one subscriber identity information of a subscriber to a second radio telecommunications network and a key;verification means for generating a result of an encryption algorithm with the aid of the key; andmeans for transmitting the result towards the second radio telecommunications network via the first telecommunications network.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/946,496 US6104928A (en) | 1997-10-07 | 1997-10-07 | Dual network integration scheme |
US946496 | 1997-10-07 | ||
US126875 | 1998-07-31 | ||
US09/126,875 US6324402B1 (en) | 1997-10-07 | 1998-07-31 | Integration scheme for a mobile telephone |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0923258A2 true EP0923258A2 (en) | 1999-06-16 |
EP0923258A3 EP0923258A3 (en) | 2000-04-12 |
Family
ID=26825108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP98203361A Withdrawn EP0923258A3 (en) | 1997-10-07 | 1998-10-06 | Integration scheme for a mobile telephone network with fixed terminals and a wireline network |
Country Status (3)
Country | Link |
---|---|
US (1) | US6324402B1 (en) |
EP (1) | EP0923258A3 (en) |
CA (1) | CA2249974A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2352125A (en) * | 1999-04-30 | 2001-01-17 | Nokia Corp | Wireless intranet office |
WO2001020929A1 (en) * | 1999-09-16 | 2001-03-22 | Tmx (Tigermax) Limited | Method and apparatus for transmitting short messages between fixed line and cellular telephone networks |
EP1164810A2 (en) * | 2000-06-12 | 2001-12-19 | Lucent Technologies Inc. | Apparatus, method and system for providing default mode for authentication failures in mobile telecommunication networks |
EP1239687A1 (en) * | 2001-03-10 | 2002-09-11 | Drive-It Systems Ab | Communication with a plurality of public land mobile communication networks (PLMNs) without roaming agreements |
EP1294204A1 (en) * | 2001-08-30 | 2003-03-19 | BRITISH TELECOMMUNICATIONS public limited company | Gateway emulating presence of mobile phone |
WO2003067910A1 (en) * | 2002-02-06 | 2003-08-14 | Telecom Italia S.P.A. | System for managing the identity of mobile stations roaming between mobile radio networks |
US6850758B1 (en) | 2000-11-28 | 2005-02-01 | Nortel Networks Limited | Method and system for integrating fixed terminals in a mobile telecommunication network |
KR100546916B1 (en) * | 2000-06-13 | 2006-01-26 | 루센트 테크놀러지스 인크 | An improved method for an authentication of a user subscription identity module |
WO2006054980A1 (en) | 2004-11-15 | 2006-05-26 | Cingular Wireless Ii, Llc | Programming and/or activating of a subscriber identity module (sim) for an analog telephone adapter (ata) device |
AU2002346211B2 (en) * | 2001-06-27 | 2008-06-12 | Sony Corporation | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
US7623852B2 (en) | 2004-11-15 | 2009-11-24 | At&T Mobility Ii Llc | Remote programming/activation of SIM enabled ATA device |
Families Citing this family (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2763198B1 (en) * | 1997-05-07 | 1999-07-23 | France Telecom | TELECOMMUNICATIONS NETWORK WITH FIXED AND MOBILE SUBSCRIBERS |
US6230006B1 (en) | 1997-09-08 | 2001-05-08 | Acterna, Llc | Test system for remotely testing switches within a telecommunications network |
US6526026B1 (en) * | 1997-12-10 | 2003-02-25 | Intel Corporation | Digit transmission over wireless communication link |
DE19828735A1 (en) * | 1998-06-29 | 1999-12-30 | Giesecke & Devrient Gmbh | Mobile radio system e.g. mobile telephone system |
EP0978982A1 (en) * | 1998-08-05 | 2000-02-09 | Siemens Aktiengesellschaft | Method for managing a service for a user |
US7020441B2 (en) * | 1998-09-03 | 2006-03-28 | Casabyte, Inc. | Test system for remotely testing switches within a telecommunications network |
US6560216B1 (en) * | 1998-09-17 | 2003-05-06 | Openwave Systems Inc. | Data network computing device call processing |
US6799155B1 (en) * | 1998-12-11 | 2004-09-28 | Allied Signal Inc. | Replacement of externally mounted user interface modules with software emulation of user interface module functions in embedded processor applications |
EP1014742B1 (en) * | 1998-12-22 | 2005-02-09 | Alcatel | Location indication means and method for service availability in a radio telephone network |
NO310950B1 (en) * | 1999-03-10 | 2001-09-17 | Ericsson Telefon Ab L M | Device for improving voice quality, especially for VoIP (Voice over IP) calls |
GB2355885A (en) * | 1999-07-30 | 2001-05-02 | Nokia Telecommunications Oy | Network access control |
US6865169B1 (en) | 1999-11-02 | 2005-03-08 | Ipwireless, Inc. | Cellular wireless internet access system using spread spectrum and internet protocol |
US6873609B1 (en) * | 1999-11-02 | 2005-03-29 | Ipwireless, Inc. | Use of internet WEB technology for wireless internet access |
US8117291B1 (en) | 1999-11-02 | 2012-02-14 | Wireless Technology Solutions Llc | Use of internet web technology to register wireless access customers |
US8463231B1 (en) | 1999-11-02 | 2013-06-11 | Nvidia Corporation | Use of radius in UMTS to perform accounting functions |
US6782276B1 (en) * | 2000-03-23 | 2004-08-24 | Nortel Networks Limited | Signaling aggregator and method for use in a signaling network |
EP1173037B1 (en) * | 2000-07-14 | 2006-03-22 | NTT DoCoMo, Inc. | Location registration method supporting multiple SIM cards with different functions |
US6922557B2 (en) * | 2000-10-18 | 2005-07-26 | Psion Teklogix Inc. | Wireless communication system |
US7409685B2 (en) | 2002-04-12 | 2008-08-05 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
ES2656351T3 (en) * | 2000-12-14 | 2018-02-26 | Counterpath Corporation | Method of re-selecting mobile phone between a cellular circuit switching network and a packet switching network |
US7349700B1 (en) * | 2001-08-30 | 2008-03-25 | Aol Llc | Communication system and method |
US7218721B1 (en) | 2002-01-02 | 2007-05-15 | 8X8, Inc. | Virtual telephone extension |
US6947758B2 (en) * | 2001-12-05 | 2005-09-20 | Samsung Electronics Co., Ltd. | System and method for providing a distributed processing element unit in a mobile telecommunications network |
US20080254766A1 (en) * | 2007-04-10 | 2008-10-16 | Craven Jeffrey A | Method and system for using an integrated subscriber identity module in a network interface unit |
US20030212616A1 (en) * | 2002-05-09 | 2003-11-13 | Casabyte, Inc. | Method, apparatus and article to remotely associate wireless communications devices with subscriber identities and/or proxy wireless communications devices |
EP1369762A1 (en) * | 2002-05-29 | 2003-12-10 | Dialog Semiconductor GmbH | Active subscriber information module |
FI117586B (en) * | 2002-08-02 | 2006-11-30 | Nokia Corp | Method for arranging a SIM function in a digital wireless terminal device as well as the corresponding terminal device and server |
US7181210B2 (en) * | 2002-09-24 | 2007-02-20 | Redknee Inc. | Method and system for international roaming and call bridging |
US7421072B2 (en) * | 2002-10-04 | 2008-09-02 | Avaya Inc | Location-based bridging in call centers |
KR100972059B1 (en) * | 2002-12-30 | 2010-07-22 | 동부일렉트로닉스 주식회사 | CMOS image sensor manufacturing method for improving uniformity ot micro lens |
US7324801B2 (en) * | 2003-03-06 | 2008-01-29 | Motorola, Inc. | Emergency call-back for a wireless communication device equipped with a user removable module |
FI20030943A (en) * | 2003-06-25 | 2004-12-26 | Nokia Corp | Procedure for configuring parameters for a machine-to-machine module and a machine-to-machine module |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
US20050070248A1 (en) * | 2003-09-29 | 2005-03-31 | Neeraj Gaur | Method and system for maintaining media objects when switching mobile devices |
US7860498B2 (en) * | 2003-12-01 | 2010-12-28 | Sybase 365, Inc. | System and method for virtual carrier addressing and routing for global short message service |
US7406334B2 (en) * | 2004-01-26 | 2008-07-29 | Sbc Knowledge Ventures, L.P. | Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal |
US7904895B1 (en) | 2004-04-21 | 2011-03-08 | Hewlett-Packard Develpment Company, L.P. | Firmware update in electronic devices employing update agent in a flash memory card |
US20060020552A1 (en) * | 2004-07-26 | 2006-01-26 | James Sloan | Copy-restriction system for digitally recorded, computer disk-based music recordings |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
JP2006085227A (en) * | 2004-09-14 | 2006-03-30 | Fujitsu Ltd | Communication terminal equipment |
US7853221B2 (en) * | 2004-11-12 | 2010-12-14 | Homerun Holdings Corp. | Network bridge device and methods for programming and using the same |
DE102005006331B4 (en) * | 2005-02-10 | 2008-12-04 | Pixcall Gmbh | Communication method with transmission of additional information |
WO2006119454A1 (en) * | 2005-05-04 | 2006-11-09 | Mediacell Licensing Corp | Enclosure with ground plane |
EP1908190A4 (en) * | 2005-07-14 | 2012-01-11 | Sandwave Ip Llc | Virtual cells for wireless networks |
US20070015538A1 (en) * | 2005-07-15 | 2007-01-18 | Eugene Wang | Network and method for the localization and customization of new mobile devices employing SIM/smart card |
US8504678B2 (en) | 2005-12-30 | 2013-08-06 | Sandwave Ip, Llc | Traffic routing based on geophysical location |
US20070167171A1 (en) * | 2005-12-30 | 2007-07-19 | Mediacell Licensing Corp | Determining the Location of a Device Having Two Communications Connections |
US8582498B2 (en) * | 2006-03-07 | 2013-11-12 | Sandwave Ip, Llc | Service subscription using geophysical location |
EP2025095A2 (en) | 2006-06-08 | 2009-02-18 | Hewlett-Packard Development Company, L.P. | Device management in a network |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US20090125996A1 (en) | 2007-09-19 | 2009-05-14 | Interdigital Patent Holdings, Inc. | Virtual subscriber identity module |
DE102007044905A1 (en) * | 2007-09-19 | 2009-04-09 | InterDigital Patent Holdings, Inc., Wilmington | Method and device for enabling service usage and determination of subscriber identity in communication networks by means of software-based access authorization cards (vSIM) |
US10231112B1 (en) * | 2009-08-26 | 2019-03-12 | Sprint Spectrum L.P. | Method and system for emitting pilot beacons |
DE102009043090A1 (en) * | 2009-09-25 | 2011-03-31 | Wincor Nixdorf International Gmbh | Device for handling notes of value |
CN102917339B (en) * | 2012-10-11 | 2014-06-11 | 华为技术有限公司 | Methods, device and system for realization and communication of virtual subscriber identity module |
US11044360B1 (en) | 2015-12-17 | 2021-06-22 | 8X8, Inc. | Dynamic direction of incoming calls |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0602779A2 (en) * | 1992-10-30 | 1994-06-22 | AT&T Corp. | Wireless personalized communications system |
EP0779757A2 (en) * | 1995-12-16 | 1997-06-18 | Alcatel | Mobile radio system with wired subscriber equipment |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USH1641H (en) * | 1993-11-30 | 1997-04-01 | Gte Mobile Communications Service Corporation | Connection of mobile devices to heterogenous networks |
ES2108622B1 (en) * | 1994-12-30 | 1998-07-01 | Alcatel Standard Electrica | AUTHORIZATION OF SUBSCRIBER IDENTITY IN FIXED CELL PHONE TERMINALS. |
SE503858C2 (en) * | 1995-03-03 | 1996-09-23 | Ericsson Telefon Ab L M | Method and apparatus for connecting a connection in a telecommunications network |
US5953651A (en) * | 1995-05-04 | 1999-09-14 | Interwave Communications International, Ltd. | Cellular adjunct to a public wired network |
DE19525363A1 (en) * | 1995-07-12 | 1997-01-16 | Sel Alcatel Ag | Virtual private network for mobile subscribers |
US5787087A (en) * | 1995-10-11 | 1998-07-28 | Visser; John A. | Method and apparatus for interconnecting a plurality of terminal equipments to the ISDN |
US5890064A (en) * | 1996-03-13 | 1999-03-30 | Telefonaktiebolaget L M Ericsson (Publ) | Mobile telecommunications network having integrated wireless office system |
-
1998
- 1998-07-31 US US09/126,875 patent/US6324402B1/en not_active Expired - Lifetime
- 1998-10-06 EP EP98203361A patent/EP0923258A3/en not_active Withdrawn
- 1998-10-07 CA CA002249974A patent/CA2249974A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0602779A2 (en) * | 1992-10-30 | 1994-06-22 | AT&T Corp. | Wireless personalized communications system |
EP0779757A2 (en) * | 1995-12-16 | 1997-06-18 | Alcatel | Mobile radio system with wired subscriber equipment |
Non-Patent Citations (1)
Title |
---|
WROBEL E: "CONVERGENCE OF FIXED AND MOBILE SERVICES IN GSM/DCS NETWORKS" ELECTRICAL COMMUNICATION,BE,ALCATEL. BRUSSELS,1 July 1997 (1997-07-01), page 180-185 XP000727554 ISSN: 0013-4252 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2352125A (en) * | 1999-04-30 | 2001-01-17 | Nokia Corp | Wireless intranet office |
US7342905B1 (en) | 1999-04-30 | 2008-03-11 | Nokia Corporation | Communications system |
WO2001020929A1 (en) * | 1999-09-16 | 2001-03-22 | Tmx (Tigermax) Limited | Method and apparatus for transmitting short messages between fixed line and cellular telephone networks |
EP1164810A2 (en) * | 2000-06-12 | 2001-12-19 | Lucent Technologies Inc. | Apparatus, method and system for providing default mode for authentication failures in mobile telecommunication networks |
EP1164810A3 (en) * | 2000-06-12 | 2002-07-03 | Lucent Technologies Inc. | Apparatus, method and system for providing default mode for authentication failures in mobile telecommunication networks |
US7010699B1 (en) | 2000-06-12 | 2006-03-07 | Lucent Technologies Inc | Apparatus, method and system for providing a default mode for authentication failures in mobile telecommunication networks |
KR100546916B1 (en) * | 2000-06-13 | 2006-01-26 | 루센트 테크놀러지스 인크 | An improved method for an authentication of a user subscription identity module |
US6850758B1 (en) | 2000-11-28 | 2005-02-01 | Nortel Networks Limited | Method and system for integrating fixed terminals in a mobile telecommunication network |
EP1239687A1 (en) * | 2001-03-10 | 2002-09-11 | Drive-It Systems Ab | Communication with a plurality of public land mobile communication networks (PLMNs) without roaming agreements |
AU2002346211B2 (en) * | 2001-06-27 | 2008-06-12 | Sony Corporation | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
EP1294204A1 (en) * | 2001-08-30 | 2003-03-19 | BRITISH TELECOMMUNICATIONS public limited company | Gateway emulating presence of mobile phone |
WO2003067910A1 (en) * | 2002-02-06 | 2003-08-14 | Telecom Italia S.P.A. | System for managing the identity of mobile stations roaming between mobile radio networks |
US7031704B2 (en) | 2002-02-06 | 2006-04-18 | Telecom Italia | System for managing the identity of mobile stations roaming between mobile radio networks |
WO2006054980A1 (en) | 2004-11-15 | 2006-05-26 | Cingular Wireless Ii, Llc | Programming and/or activating of a subscriber identity module (sim) for an analog telephone adapter (ata) device |
US7623852B2 (en) | 2004-11-15 | 2009-11-24 | At&T Mobility Ii Llc | Remote programming/activation of SIM enabled ATA device |
US8380180B2 (en) | 2004-11-15 | 2013-02-19 | At&T Mobility Ii Llc | Remote programming/activation of SIM enabled ATA device |
Also Published As
Publication number | Publication date |
---|---|
CA2249974A1 (en) | 1999-04-07 |
US6324402B1 (en) | 2001-11-27 |
EP0923258A3 (en) | 2000-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6324402B1 (en) | Integration scheme for a mobile telephone | |
US6104928A (en) | Dual network integration scheme | |
US5878343A (en) | Telecommunications systems arrangement | |
US6850758B1 (en) | Method and system for integrating fixed terminals in a mobile telecommunication network | |
US6327479B1 (en) | Procedure and system for the transmission of a short message in a telecommunication network | |
US5557654A (en) | System and method for authenticating subscribers of a transmission network and subscription, having differing authentication procedures, using a common authentication center | |
CN1285203C (en) | Method and apparatus for anonymous network access in the absence of a mobile subscriber identity module | |
US5325419A (en) | Wireless digital personal communications system having voice/data/image two-way calling and intercell hand-off | |
US20100303232A1 (en) | Wireless Digital Personal Communications System Having Voice/Data/Image Two-Way Calling and Intercell Hand-Off Provided Through Distributed Logic Resident in Portable Handset Terminals, Fixed Terminals, Radio Cell Base Stations and Switched Telephone Network | |
US6363151B1 (en) | Method and system for subscriber authentification and/or encryption of items of information | |
US20030081565A1 (en) | Method and apparatus for providing communication between a PBX terminal and a public wireless network via a private wireless network | |
JPH08511921A (en) | How to establish a call | |
US7489658B2 (en) | Dual stack mobile communication system | |
AU710178B2 (en) | Communication system and call establishment methods | |
US6748236B1 (en) | System for using a GSM mobile telephone in a dect mobile communication network | |
US6678533B1 (en) | Method for connecting an incoming call in a wireless telecommunications installation to a dual mode terminal | |
US7218913B2 (en) | Company telephone network | |
EP1090513B1 (en) | Method and network element for connecting a subscriber to a cellular telecommunications network | |
US6892079B1 (en) | Procedure for setting up a call in a wireless local loop | |
EP1010335A2 (en) | Procedure for setting up a call in a wireless local loop | |
KR19990041046A (en) | Transfer method in high-permeability paging mode of satellite communication terminal | |
WO2001022757A1 (en) | Method of processing charging information | |
EP0930795A1 (en) | Method for authentication of a mobile subscriber in a telecommunication network | |
JPH08307943A (en) | Authentication processing system | |
Jayapalan et al. | Data services impact on architecture and signalling in mobile networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17P | Request for examination filed |
Effective date: 20000914 |
|
AKX | Designation fees paid |
Free format text: DE FR GB |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20060503 |